Powered by Deep Web Technologies
Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

2

Department of Homeland Security Workshop  

Science Conference Proceedings (OSTI)

Homeland Security Modeling and Simulation Workshop. Purpose: This workshop is a joint effort of US Department of Homeland ...

2011-06-14T23:59:59.000Z

3

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

4

The Department of Homeland Security Energy Management Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security Homeland Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy- related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner." (Executive Order 13423, Section 1 - Policy) DHS Energy Program Overview Steven W. White, CEM May 2, 2007 3 Program Foundation  Comply with requirements of Laws, Regulations and Executive

5

Homeland Security Presidential Directive 12  

NLE Websites -- All DOE Office Websites (Extended Search)

HSPD-12 Home HSPD-12 FAQs About the DOE HSPD-12 Badge HSPD-12 Reporting Metrics for OMB HSPD-12 Implementation Progress Guidance Related Links HSS Logo Homeland Security...

6

Homeland Security Programs/Projects for the Intelligent ...  

Science Conference Proceedings (OSTI)

Homeland Security Programs/Projects for the Intelligent Systems Division. Department of Homeland Security Urban Search ...

2011-12-23T23:59:59.000Z

7

NIST Testimony on Homeland Security Issues  

Science Conference Proceedings (OSTI)

NIST Testimony on Homeland Security Issues. 2012. 050912 Saunders House Testimony 050912 Saunders House Testimony ...

2010-10-05T23:59:59.000Z

8

Homeland Security Chemical/Biological/Radiological/Nuclear ...  

Science Conference Proceedings (OSTI)

... Information at NIST. Homeland Security Chemical/Biological/Radiological/ Nuclear/Explosives (CBRNE) Information at NIST. ...

2010-09-24T23:59:59.000Z

9

Homeland Security and Emergency Management Coordination (HSEMC...  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

10

Homeland Security Presidential Directive 7  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 Homeland Security Presidential Directive/Hspd-7 3 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization, and Protection Purpose (1) This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks. Background (2) Terrorists seek to destroy, incapacitate, or exploit critical infrastructure and key resources across the United States to threaten national security, cause mass casualties, weaken our economy, and damage public morale and confidence. (3) America's open and technologically complex society includes a wide array of critical infrastructure

11

IT issues on homeland security and defense  

Science Conference Proceedings (OSTI)

This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. ... Keywords: and cyber threats, emergency readiness, homeland defense, homeland security, terror and disaster control

Kangbin Yim; Ilsun You

2011-08-01T23:59:59.000Z

12

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

13

Homeland security R&D roadmapping : risk-based methodological options.  

SciTech Connect

The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

Brandt, Larry D.

2008-12-01T23:59:59.000Z

14

Nonproliferation & Homeland Security Field Support | Global and...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Homeland Security Field Support Group provides radiological assistance to federal and state agencies under the DOE Radiological Assistance Program (RAP), field support for...

15

Creative homeland security : imagining the next big solar storm.  

E-Print Network (OSTI)

??Creative Homeland Security: Imagining the next big solar storm aims to examine the use of creative practice within homeland security research. In this thesis, a… (more)

Alfonso, Jonathan Rousseau

2012-01-01T23:59:59.000Z

16

Experts to Review Life-Saving Homeland Security Standards  

Science Conference Proceedings (OSTI)

Experts to Review Life-Saving Homeland Security Standards. For Immediate Release: September 27, 2007. ...

2013-12-12T23:59:59.000Z

17

U.S. Homeland Security R&D Budgets  

Science Conference Proceedings (OSTI)

The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

Halvorson, C S

2009-03-30T23:59:59.000Z

18

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

19

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

20

Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism after September 11  

E-Print Network (OSTI)

Homeland Security vs. the Madisonian Impulse: State Buildingstate pursue “homeland security. ” Jay Stowsky is Adjunctcritics of US homeland security policy have consistently

Stowsky, Jay; Kroenig, Matthew

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Policies: Homeland Security Presidential Directive/Hspd-7  

Science Conference Proceedings (OSTI)

... appropriate systems, mechanisms, and procedures to share homeland security information relevant ... (a) commercial nuclear reactors for generating ...

22

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

23

Homeland Security and Emergency Management Coordination (HSEMC) Program |  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Homeland Security and Emergency Management Coordination (HSEMC) Program Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Homeland Security and Emergency Management Coordination

24

ICE Press Office U.S. Department of Homeland Security  

E-Print Network (OSTI)

ICE Press Office U.S. Department of Homeland Security December 19, 2003 Contact: SEVP Fact Sheet) at (202) 353-3049. www.ice.gov #12;

Wisconsin at Madison, University of

25

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security and Governmental Affairs Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives 8-5-09_Final_Testimony_(Bashista).pdf More Documents & Publications Special Report: IG-RA-09-02 Before Senate Committee on Homeland Security and Governmental Affairs

26

Homeland Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

27

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

28

A knowledge sharing framework for homeland security modeling and simulation  

Science Conference Proceedings (OSTI)

Modeling and simulation (M&S) tools and capabilities can enable understanding of the complex nature of systems in various homeland security domains. A coordinated effort across government, industry, and academia would advance capabilities in this important ...

Sanjay Jain; Charles W. Hutchings; Y. Tina Lee; Charles R. McLean

2010-12-01T23:59:59.000Z

29

Recommended practices for homeland security modeling and simulation  

Science Conference Proceedings (OSTI)

This paper recommends practices for development and deployment of modeling, simulation, and analysis (MS&A) tools for homeland security applications. The proposed set of recommended practices applicable to any MS&A application includes: software engineering ...

Sanjay Jain; Charles R. McLean

2009-12-01T23:59:59.000Z

30

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network (OSTI)

This fact sheet describes Homeland Security issues that affect Texas and the nation. It includes an overview of some of the key water resource issues associated with preventing intentional contamination of water supplies served by small water systems.

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

31

The Engineer's Role in Homeland Security  

Science Conference Proceedings (OSTI)

... information security and critical infrastructure protection; Second, the safety of structures ... biological, radiological, nuclear, and explosive ...

2010-10-05T23:59:59.000Z

32

ORISE: California Homeland Security Exercise and Evaluation Program (HSEEP)  

NLE Websites -- All DOE Office Websites (Extended Search)

California Homeland Security Exercise and Evaluation Program (HSEEP) California Homeland Security Exercise and Evaluation Program (HSEEP) Training The Oak Ridge Institute for Science and Education (ORISE) and the California Governor's Office of Emergency Services) have revised the next generation Homeland Security Exercise and Evaluation Program (HSEEP) course to create a balance between learning exercise methodology and using Web-based toolkit activities to plan and develop exercises. The revised HSEEP training course is a four-day, interactive course with computer-based activities that maximize use of the HSEEP Toolkit. The course is focused on hands-on, toolkit activities that provide participants with valuable practice and training. The course also allows participants to use their own jurisdictional information to complete course activities,

33

Northwest Regional Technology Center, December 2012 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

of Homeland Security's Domestic Nuclear Detection Office's Operations Support Directorate supports state Security December 2012 The Northwest Regional Technology Center (NWRTC) is a virtual resource center, response, and recovery. The center enables homeland security solutions for emergency responder communities

34

Homeland Security Presidential Directive 12 - Related Links  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

35

Homeland Security Presidential Directive 12 - Frequently Asked...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

36

Homeland Security Presidential Directive 12 - Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

37

Alternatives to 3He for Neutron Detection for Homeland Security  

Science Conference Proceedings (OSTI)

Neutron detection is an essential aspect of interdiction of radiological threats for national security purposes, since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons. Radiation portal monitoring systems, of which there are thousands deployed for homeland security and non-proliferation purposes, currently use 3He gas-filled proportional counters for detecting neutrons. Because of the high usage of 3He for neutron scattering science and national security, the supply has dwindled, and can no longer meet the demand. Consequently, a replacement technology for neutron detection is required in the very near future.

Kouzes, Richard T.; Conlin, Kenneth E.; Ely, James H.; Erikson, Luke E.; Kernan, Warnick J.; Lintereur, Azaree T.; Siciliano, Edward R.; Stephens, Daniel L.; Stromswold, David C.; Van Ginhoven, Renee M.; Woodring, Mitchell L.

2010-08-11T23:59:59.000Z

38

Critical issues in process control system security : DHS spares project.  

SciTech Connect

The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

2010-10-01T23:59:59.000Z

39

Turning Ideas into Practice: How to Access Homeland Security R&D ...  

IBD-PO-10/01 Turning Ideas into Practice: How to Access Homeland Security R&D from Public Institutions September 16, 2003 Belinda Padilla Technology Commercialization ...

40

Before the House Subcommittee on Counterterrorism and Intelligence- Committee on Homeland Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Implications of Refinery Closures for U.S. Homeland Security and Critical Infrastructure Safety By: Howard Gruenspecht, Acting Administrator of the Energy Information Administration

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

Science Conference Proceedings (OSTI)

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

42

Enhanced homeland security and disaster emergency operations based on biometrics and RFID  

Science Conference Proceedings (OSTI)

Methods that enhance homeland security and disaster emergency operations through biometrics and Radio Frequency Identification (RFID) were studied. Biometrics can be used in visas and e-passports for border security, identity verification at airports, ...

Lidong Wang

2012-07-01T23:59:59.000Z

43

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

44

A Survey of Operations Research Models and Applications in Homeland Security  

Science Conference Proceedings (OSTI)

Operations research has had a long and distinguished history of work in emergency preparedness and response, airline security, transportation of hazardous materials, and threat and vulnerability analysis. Since the attacks of September 11, 2001 and the ... Keywords: agencies, government, homeland security, planning

P. Daniel Wright; Matthew J. Liberatore; Robert L. Nydick

2006-11-01T23:59:59.000Z

45

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

SciTech Connect

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

46

HOMELAND SECURITY A Selected Bibliography U.S. ARMY WAR COLLEGE LIBRARY  

E-Print Network (OSTI)

This bibliography includes topics that reflect some of homeland security's many challenges: borders and immigration, cybersecurity, organization, policy, response capabilities, and resourcing. With certain exceptions, the materials in this bibliography are dated from 2006 to the present. For older materials, please see Homeland Security, compiled by Jeanette Moyer, May 2006. All items are available through the USAWC Library. For your convenience, we have added U.S. Army War College Library call numbers, Internet addresses, or database links at the end of each entry. Web sites were accessed March 2011. This bibliography and others compiled by our research librarians are available online through the Library’s home page at

Greta H. Andrusyszyn

2011-01-01T23:59:59.000Z

47

Homeland Security Presidential Directive 12 - DOE HSPD-12 Implementati...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

48

Analytical Chemistry for Homeland Defense and National Security  

SciTech Connect

The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

2002-08-18T23:59:59.000Z

49

Passive Neutron Detection in Ports for Homeland Security Applications  

E-Print Network (OSTI)

The smuggling of special nuclear material (SNM) has long been a concern. In April 2009, President Obama declared that a terrorist acquiring a nuclear weapon was the most immediate threat to global security. The Second Line of Defense (SLD) initiative was stood up by the National Nuclear Security Administration to deter, detect, and interdict illicit trafficking of nuclear and radioactive materials across international borders and maritime shipping. The SLD initiative does not provide for the detection of SNM being carried on small, personal watercraft. Previous work examined the possibility of using active neutron detectors to induce fission in SNM and detect the response. This thesis examines the possibility of detecting SNM using passive 3He neutron detectors. Monte Carlo N-Particle (MCNP) simulations were run to determine the best detector configuration. Detecting sources at increasing depths, detecting moving sources and the effects of waves were also simulated in MCNP. Comparisons with experimental measurements showed that detectors parallel to the surface of water were best at detecting neutron sources below the surface. Additionally, stacking detectors and placing a cadmium sheet between the polyethylene blocks resulted in a greater ability to determine the height of a source by taking the ratio of count rates in the lower and upper detectors. Using this configuration, a source of strength 3.39 x 10^5 n/s could be detected to a depth of 12.00 in below the water surface. Count rates in the presence of waves did not average out to count rates taken above a flat plane of water. Detectors closer to the water performed worse than above a flat plane while detectors placed higher recorded more counts than above a flat plane. Moving sources were also simulated; sources under water, 3.00 ft from the detectors, and moving at 5.8 kts could be detected above background.

Pedicini, Eowyn E

2013-05-01T23:59:59.000Z

50

Gregory H. Friedman: Provided for the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs  

Energy.gov (U.S. Department of Energy (DOE))

Statement of Gregory H. Friedman Inspector General U.S. Department of Energy Before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs U.S. Senate

51

Fermilab | Science at Fermilab | Benefits to Society | Homeland...  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland security Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and...

52

Improving the nuclear data base for non-proliferation and homeland security  

Science Conference Proceedings (OSTI)

Many of the technical advances in non-proliferation and homeland security require calculations of transport of neutrons and gamma-rays through materials. The nuclear data base on which these calculations are made must be of high quality in order for the calculated responses to be credible. At the Los Alamos Neutron Science Center, three spallation neutron sources are being used to provide high-quality cross section and structure data with reactions induced by neutrons. Neutron transmission, neutron-induced fission and capture cross sections, neutron emission in fission, and gamma-ray production by neutrons are principal areas of research. Furthermore, these sources are also being used to validate calculations of the characterization and response of new detectors and detection techniques. Current research activities are summarized here.

Haight, Robert C [Los Alamos National Laboratory; Bitteker, Leo J [Los Alamos National Laboratory; Couture, Aaron J [Los Alamos National Laboratory; Devlin, Matthew J [Los Alamos National Laboratory; Fotiadis, Nikolaos [Los Alamos National Laboratory; Gavron, Avigdor [Los Alamos National Laboratory; Hill, Tony S [Los Alamos National Laboratory; Laptev, Alexander B [Los Alamos National Laboratory; Nelson, Ronald O [Los Alamos National Laboratory; O'donnell, John M [Los Alamos National Laboratory; Taddeucci, Terry N [Los Alamos National Laboratory; Tovesson, Fredrik K [Los Alamos National Laboratory; Ulmann, John L [Los Alamos National Laboratory; Wender, Stephen A [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

53

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

54

Compact Dielectric Wall Accelerator Development For Intensity Modulated Proton Therapy And Homeland Security Applications  

Science Conference Proceedings (OSTI)

Compact dielectric wall (DWA) accelerator technology is being developed at the Lawrence Livermore National Laboratory. The DWA accelerator uses fast switched high voltage transmission lines to generate pulsed electric fields on the inside of a high gradient insulating (HGI) acceleration tube. Its high electric field gradients are achieved by the use of alternating insulators and conductors and short pulse times. The DWA concept can be applied to accelerate charge particle beams with any charge to mass ratio and energy. Based on the DWA system, a novel compact proton therapy accelerator is being developed. This proton therapy system will produce individual pulses that can be varied in intensity, energy and spot width. The system will be capable of being sited in a conventional linac vault and provide intensity modulated rotational therapy. The status of the developmental new technologies that make the compact system possible will be reviewed. These include, high gradient vacuum insulators, solid dielectric materials, SiC photoconductive switches and compact proton sources. Applications of the DWA accelerator to problems in homeland security will also be discussed.

Chen, Y -; Caporaso, G J; Guethlein, G; Sampayan, S; Akana, G; Anaya, R; Blackfield, D; Cook, E; Falabella, S; Gower, E; Harris, J; Hawkins, S; Hickman, B; Holmes, C; Horner, A; Nelson, S; Paul, A; Pearson, D; Poole, B; Richardson, R; Sanders, D; Stanley, J; Sullivan, J; Wang, L; Watson, J; Weir, J

2009-06-17T23:59:59.000Z

55

Northwest Regional Technology Center, November 2012 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

, operated by the Pacific Northwest National Laboratory (PNNL), to support regional preparedness, resiliency Responders to effectively counter a potential threat to our Nation. PNNL, in collaboration with DHS S. To better determine the requirements and needs of First Responders in a daily operational context, PNNL held

56

Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications  

SciTech Connect

When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data parameterizations on IMAAC/NARAC fate and transport predictions. A case study involving coastal sea breeze circulation patterns in the NYC region was used to investigate the sensitivity of atmospheric dispersion results on the source of three-dimensional wind field data.

Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

2010-04-26T23:59:59.000Z

57

Economics definitions, methods, models, and analysis procedures for Homeland Security applications.  

SciTech Connect

This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

2010-01-01T23:59:59.000Z

58

AMI Cyber Security Incident Response Guidelines  

Science Conference Proceedings (OSTI)

This document is intended to be used by system and asset owners to assist in the preparation and response to AMI cyber security incidents. This document was developed by conducting interviews with EPRI members, AMI asset owners, and vendors, regarding practices involved in responding to AMI cyber security incidents and mapping the responses to requirements put forth by the Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Open Smart Grid (Open-SG) Working ...

2012-12-07T23:59:59.000Z

59

Briefings on Physical Security of Electricity Substations  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

60

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS – NEW YORK, NY  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS – BOSTON, MA  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

62

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS – DENVER, CO  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

63

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS – HOUSTON, TX  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

64

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS – TAMPA, FL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

65

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS – CHICAGO, IL  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations.

66

Control Systems Security Test Center - FY 2004 Program Summary  

Science Conference Proceedings (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

67

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

68

SAMPLING AND MASS SPECTROMETRY APPROACHES FOR THE DETECTION OF DRUGS AND FOREIGN CONTAMINANTS IN BREATH FOR HOMELAND SECURITY APPLICATIONS  

Science Conference Proceedings (OSTI)

Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid phase microextraction (SPME) and identified using gas chromatography - mass spectrometry (GC-MS). Modifications to the sampling apparatus allowed for increased VOC collection efficiency, and reduced the time of sampling and analysis by over 25%. The VOCs are present in breath due to either endogenous production, or exposure to an external source through absorption, inhalation, or ingestion. Detection of these exogenous chemicals can provide information on the prior location and activities of the subject. Breath samples collected before and after exposure in a hardware store and nail salon were analyzed to investigate the prior location of a subject; breath samples collected before and after oral exposure to terpenes and terpenoid compounds, pseudoephedrine, and inhalation exposure to hexamine and other explosive related compounds were analyzed to investigate the prior activity of a subject. The elimination of such compounds from the body was also monitored. In application, this technique may provide an early warning system to identify persons of interest in the prevention and preemption stages of homeland security.

Martin, A N

2009-01-27T23:59:59.000Z

69

Homeland Security Portal  

Science Conference Proceedings (OSTI)

... Biological/Radiological/Nuclear/Explosives (CBRNE); Critical Infrastructure Protection (CIP); Cybersecurity; National Construction Safety Team ...

2013-05-16T23:59:59.000Z

70

DHS National Incident  

Science Conference Proceedings (OSTI)

Page 1. Transforming Federal Cyber Security Management June 12, 2013 1 Page 2. Outline 1. Securing .gov 2. Why CDM1? ...

2013-06-17T23:59:59.000Z

71

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

72

An input-output procedure for calculating economy-wide economic impacts in supply chains using homeland security consequence analysis tools.  

SciTech Connect

Sandia National Laboratories has developed several models to analyze potential consequences of homeland security incidents. Two of these models (the National Infrastructure Simulation and Analysis Center Agent-Based Laboratory for Economics, N-ABLE{trademark}, and Loki) simulate detailed facility- and product-level consequences of simulated disruptions to supply chains. Disruptions in supply chains are likely to reduce production of some commodities, which may reduce economic activity across many other types of supply chains throughout the national economy. The detailed nature of Sandia's models means that simulations are limited to specific supply chains in which detailed facility-level data has been collected, but policymakers are often concerned with the national-level economic impacts of supply-chain disruptions. A preliminary input-output methodology has been developed to estimate national-level economic impacts based upon the results of supply-chain-level simulations. This methodology overcomes two primary challenges. First, the methodology must be relatively simple to integrate successfully with existing models; it must be easily understood, easily applied to the supply-chain models without user intervention, and run quickly. The second challenge is more fundamental: the methodology must account for both upstream and downstream impacts that result from supply-chain disruptions. Input-output modeling typically estimates only upstream impacts, but shortages resulting from disruptions in many supply chains (for example, energy, communications, and chemicals) are likely to have large downstream impacts. In overcoming these challenges, the input-output methodology makes strong assumptions about technology and substitution. This paper concludes by applying the methodology to chemical supply chains.

Smith, Braeton J.; Vugrin, Eric D.; Loose, Verne W.; Warren, Drake E.; Vargas, Vanessa N.

2010-10-01T23:59:59.000Z

73

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

74

Fluid Mechanics and Homeland Security  

E-Print Network (OSTI)

. Exploring further, the user may wish to understand why, for example, plutonium is so strongly related reference system. If users click on plutonium, they receive a list of explanations of how nuclear power and plutonium are related, a list that includes the above explanation. #12;power. By clicking on plutonium

Settles, Gary S.

75

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

76

May 18, 2012 SBIR Alerting Service  

E-Print Network (OSTI)

AND INFORMATION DHS DNDO FY12.1 SBIR Solicitation Opens The Department of Homeland Security (DHS) Domestic Nuclear The Department of Homeland Security (DHS) Science & Technology (S&T) program began accepting proposals

77

National Vulnerability Database (NVD)  

Science Conference Proceedings (OSTI)

... Technology (NIST) Computer Security Division and is sponsored by the Department of Homeland Security's (DHS) National Cyber Security Division ...

2013-03-06T23:59:59.000Z

78

White Paper DHS Response to the NIST Cybersecurity ...  

Science Conference Proceedings (OSTI)

... NIST RFI in turn, this White Paper summarizes DHS ... Where relevant, this paper also references related DHS ... consider these resources in light of the ...

2013-05-28T23:59:59.000Z

79

Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event  

SciTech Connect

Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected information from across disciplines to outline where the state of knowledge on IND response is. In addition, the report looked at meetings that were held over the summer in various cities. The meetings were attended by both federal responders and local responders. The meetings explored issues regarding IND preparation and how to mitigate the effects of an IND detonation. Looking at the research and current preparation activity the report found that the state of knowledge in responding and communicating is a mixed bag. Some aspects of an IND attack are well understood, some are not, but much is left to synthesize. The effects of an IND would be devastating, yet much can be done to mitigate those effects through education, preparation, and research. A major gap in current knowledge is how to effectively communicate with the public before an attack. Little research on the effectiveness of public education has been done, but it is likely that educating the public about the effects of an IND and how to best protect oneself could save many lives.

A., B

2008-07-31T23:59:59.000Z

80

Thank you again for agreeing to serve on the program ...  

Science Conference Proceedings (OSTI)

... One performed poorly against arithmetic, type transformation, and loop errors. ... ment of Homeland Security (DHS) National Cyber Security Divi- sion ...

2013-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Public Safety and Security Information in MML  

Science Conference Proceedings (OSTI)

Public Safety and Security Information in MML. ... MML plays a key role in enhancing the nation's homeland security. Through ...

2010-10-05T23:59:59.000Z

82

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

83

Cyber Security Testing and Training Programs for Industrial Control Systems  

DOE Green Energy (OSTI)

Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

Daniel Noyes

2012-03-01T23:59:59.000Z

84

JOM-e: The Role of Universities in Homeland Defense - TMS  

Science Conference Proceedings (OSTI)

Todd Stewart is director of the Program for International and Homeland Security at the Ohio State University (OSU). Jim Williams is dean of the College of ...

85

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

86

Hiring and Managing a Cyber Security Workforce:  

Science Conference Proceedings (OSTI)

... DHS cyber security workers and others from outside of ... Sell the mission! • Protecting the US nuclear arsenal or the New York City water supply is a ...

2013-09-19T23:59:59.000Z

87

Urban Search and Rescue Robots Information at NIST  

Science Conference Proceedings (OSTI)

... Unmanned Vehicle Systems Tech Transfer Forum (10 ... of Homeland Security Urban Search and Rescue ... Science and Technology Directorate (DHS ...

2010-05-24T23:59:59.000Z

88

Time and Frequency from A to Z: L  

Science Conference Proceedings (OSTI)

... However, in accordance with the Department of Homeland Security (DHS) Appropriations Act, the US Coast Guard terminated the transmission of ...

2010-10-05T23:59:59.000Z

89

HIPAA 2013 - The National Health ISAC (NH-ISAC)  

Science Conference Proceedings (OSTI)

... Department of Homeland Security (DHS) Office of Infrastructure ... Dams Critical Manufacturing /Emergency Services Nuclear Reactors, Materials and ...

2013-05-22T23:59:59.000Z

90

The future of infrastructure security : a workshop held at Sandia National Laboratories.  

SciTech Connect

Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

2013-05-01T23:59:59.000Z

91

Homeland Security/Forensics/Human Identity News  

Science Conference Proceedings (OSTI)

... Humans spend greater than 90 percent of their time indoors, but we ... Experts Recommend Measures to Reduce Human Error in Fingerprint Analysis ...

2010-12-01T23:59:59.000Z

92

Bioscience & Health Homeland Security/Forensics/Human ...  

Science Conference Proceedings (OSTI)

... vehicle Experts Recommend Measures to Reduce Human Error in Fingerprint Analysis. 13DO003_oles_fingerprintmap_CS ...

2013-05-02T23:59:59.000Z

93

Homeland Security and Disaster Resilience News  

Science Conference Proceedings (OSTI)

... Over 46 million residential structures in the United ... Wind conditions at a fire scene can ... collected data following Joplin, Missouri, tornado Release ...

2010-05-24T23:59:59.000Z

94

Homeland Security Applications (Sensors and Instrumentation and...  

NLE Websites -- All DOE Office Websites (Extended Search)

plume at 60 m from a liquid nitrogen dewar for initial testing, and the other with a propane leak from a 50-L cylinder at 720 m from the radar. Because of condensation, the cold...

95

Department of Homeland Security Transition Team  

Science Conference Proceedings (OSTI)

... Detection technologies Wide-area surveillance Ballast water verification Page 16. 16 An effective deterrent against CBRN threats ...

96

Compact Neutron Generators for Medical Home Land Security and Planetary Exploration  

E-Print Network (OSTI)

GENERATORS FOR MEDICAL, HOME LAND SECURITY AND PLANETARYdetection schemes, from home-land security applications[4-6

Reijonen, J.

2005-01-01T23:59:59.000Z

97

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

98

The future of infrastructure security : a workshop held at Sandia National Laboratories.  

Science Conference Proceedings (OSTI)

Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

2013-05-01T23:59:59.000Z

99

DHS/Federal Network Security :FISMA Metrics Deep Dive  

Science Conference Proceedings (OSTI)

... shared situational awareness Orient • Exposing information to users and autonomous capabilities to inform decision making Decide ...

2013-02-22T23:59:59.000Z

100

DHS/National Operations Center | National Nuclear Security Administrat...  

National Nuclear Security Administration (NNSA)

Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room...

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

DHS/National Operations Center | National Nuclear Security Administrat...  

National Nuclear Security Administration (NNSA)

Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering...

102

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

103

Complex Failure Forewarning System - DHS Conference Proceedings  

SciTech Connect

As the critical infrastructures of the United States have become more and more dependent on public and private networks, the potential for widespread national impact resulting from disruption or failure of these networks has also increased. Securing the nation s critical infrastructures requires protecting not only their physical systems but, just as important, the cyber portions of the systems on which they rely. A failure is inclusive of random events, design flaws, and instabilities caused by cyber (and/or physical) attack. One such domain, aging bridges, is used to explain the Complex Structure Failure Forewarning System. We discuss the workings of such a system in the context of the necessary sensors, command and control and data collection as well as the cyber security efforts that would support this system. Their application and the implications of this computing architecture are also discussed, with respect to our nation s aging infrastructure.

Abercrombie, Robert K [ORNL; Hively, Lee M [ORNL; Prowell, Stacy J [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL

2011-01-01T23:59:59.000Z

104

Cyber Security and Resilient Systems  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

105

Resilience: Theory and Applications Contents .........................................................................................................................................iii  

E-Print Network (OSTI)

;Resilience: Theory and Applications 14 "The QHSR [Quadrennial Homeland Security Review] offers the homeland closely with the four strategic elements of resilience identified in the DHS (2010) Quadrennial Homeland

Kemner, Ken

106

Infrastructure Security and Energy Restoration (ISER) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

resiliency and survivability of key energy assets and critical energy infrastructure at home and abroad. We work with the Department of Homeland Security, the Federal Energy...

107

Forensic Database Tech Digital Evidence Table  

Science Conference Proceedings (OSTI)

... Child Exploitation Hash Sets, Hash Sets, Child Exploitation, DHS-ICE, Homeland Security Investigations (HIS) - Cyber Crimes Center (C3), Hash ...

2013-06-06T23:59:59.000Z

108

JM to Revise DOE O 150.1, Continuity Programs  

Directives, Delegations, and Requirements

The revision will bring DOE O 150.1 into compliance with mandatory Department of Homeland Security (DHS) directives published since the Order was issued in ...

2013-10-03T23:59:59.000Z

109

7-MeV Neutron Interrogation: Scanner for Detection of Special ...  

Giving animals in need a HOME. November 14, 2013. ... This technology addresses applications associated with the Department of Homeland Security (DHS), Department of ...

110

Electricity Subsector Cybersecurity Capability Maturity Model...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

with the Department of Homeland Security (DHS) and involved close collaboration with industry, other Federal agencies, and other stakeholders. Electricity Subsector...

111

17.6 - Origin, Characteristics, and Significance of the DOE's...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Act provided authority for DOE to retain title to inventions in DOE's nuclear propulsion and weapons related programs. The Department of Homeland Security (DHS), by law, has...

112

Homeland Renewable Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Homeland Renewable Energy LLC Homeland Renewable Energy LLC Jump to: navigation, search Name Homeland Renewable Energy LLC Place Langhorne, Pennsylvania Zip 19047 Product Holding company for Fibrowatt LLC and its subsidiaries, which develop poultry litter-fuelled power plants in the US. Coordinates 40.176396°, -74.918884° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.176396,"lon":-74.918884,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

113

Active, Non-Intrusive Inspection Technologies for Homeland Defense  

SciTech Connect

Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

James L. Jones

2003-06-01T23:59:59.000Z

114

Nevada National Security Site-Directed Research and Development FY 2011 Annual Report  

SciTech Connect

This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

Howard Bender, comp.

2012-04-25T23:59:59.000Z

115

William Rees appointed to new Global Security leadership position...  

NLE Websites -- All DOE Office Websites (Extended Search)

the importance of the Lab's work in key program areas, including non-proliferation, intelligence support, defense, nuclear counterterrorism, and homeland security. June 16, 2009...

116

Nuclear and solar energy implications for homeland security .  

E-Print Network (OSTI)

??In the eyes of many experts, the world is moving away from oil as a cheap energy source. As this future unfolds, the United States… (more)

Thibeaux, Allen L.

2008-01-01T23:59:59.000Z

117

HSO Spotlight No 02 2012 Homeland Security Presidential Directive...  

NLE Websites -- All DOE Office Websites (Extended Search)

and those badges will need to be renewed. Appointment of HSPD-12 Renewal Officials: Each HQ element needs to assign Federal personnel within their organization as USAccess...

118

Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security  

Science Conference Proceedings (OSTI)

MC Calculations / Special Issue on the 11th International Conference on Radiation Shielding and the 15th Topical Meeting of the Radiation Protection and Shielding Division (PART 3) / Radiation Measurements and Instrumentation

Robert B. Hayes

119

Policies: Homeland Security Presidential Directive/Hspd-7  

Science Conference Proceedings (OSTI)

... Routine database systems. ... 208, OMB will rely on the CIO Council to ... of the privacy impact assessment by the Chief Information Officer, or equivalent ...

120

Prepared for the Department of Homeland Security Science and  

E-Print Network (OSTI)

NIDSTM ANP Technologies/Sm iths Detection http://www.smithsdetection.com/NIDS.php Immunoassay and reader ....................................................................................4.15 Smiths Detection: NIDSTM (Developed by ANP Technologies

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Before the Senate Homeland Security and Governmental Affairs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the Sustainable Federal Government Executive Order More Documents & Publications Data Center Optimization Plan Before the House Subcommittees on Oversight and Energy -...

122

Department of Homeland Security Urban Search and Rescue ...  

Science Conference Proceedings (OSTI)

... Response Robot Evaluation Exercise (#7) Disaster City, Texas A&M University College Station, TX November 14 - 18, 2011 November 18, 2011 ...

2013-08-17T23:59:59.000Z

123

Directionally Sensitive Neutron Detector For Homeland Security Applications  

E-Print Network (OSTI)

With an increase in the capabilities and sophistication of terrorist networks worldwide comes a corresponding increase in the probability of a radiological or nuclear device being detonated within the borders of the United States. One method to decrease the risk associated with this threat is to interdict the material during transport into the US. Current RPMS have limitations in their ability to detect shielded nuclear materials. It was proposed that directionally sensitive neutron detectors might be able to overcome many of these limitations. This thesis presents a method to create a directionally sensitive neutron detector using a unique characteristic of 10B. This characteristic is the Doppler broadening of the de-excitation gamma-ray from the 10B(n, alpha) reaction. Using conservation principles and the method of cone superposition, the mathematics for determining the incoming neutron direction vector from counts in a boron loaded cloud chamber and boron loaded semiconductor were derived. An external routine for MCNPX was developed to calculate the Doppler broaden de-excitation gamma-rays. The calculated spectrum of Doppler broadened de-excitation gamma-rays was then compared to measured and analytical spectrums and matched with a high degree of accuracy. MCNPX simulations were performed for both a prototype 10B loaded cloud chamber and prototype 10B loaded semiconductor detector. These simulations assessed the detectors' abilities to determine incoming neutron direction vectors using simulated particle reactant data. A sensitivity analysis was also performed by modifying the energy and direction vector of the simulated output data for 7Li* particles. Deviation coefficients showed a respective angular uncertainty of 1.86 degrees and 6.07 degrees for the boron loaded cloud chamber and a boron loaded semiconductor detectors. These capabilities were used to propose a possible RPM design that could be implemented.

Spence, Grant

2011-12-01T23:59:59.000Z

124

Homeland Security Presidential Directive HSPD-7 (December 17, 2003)  

Energy.gov (U.S. Department of Energy (DOE))

This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from...

125

FOIA Post from CSRC -- Guidance on Homeland Security Info. ...  

Science Conference Proceedings (OSTI)

... of our nation or threaten public safety. ... the protection of sensitive critical infrastructure information. ... if the information concerns nuclear or radiological ...

126

Department of Homeland Security, Science and Technology Directorate...  

NLE Websites -- All DOE Office Websites (Extended Search)

kWh kilowatt-hour kWm 2 kilowatts per square meter LCC life cycle cost LED light-emitting diode Li lithium Li-air lithium-air LiFePO4 lithium iron phosphate Li-ion lithium-ion...

127

Monte Carlo Simulations for Homeland Security Using Anthropomorphic Phantoms  

Science Conference Proceedings (OSTI)

A radiological dispersion device (RDD) is a device which deliberately releases radioactive material for the purpose of causing terror or harm. In the event that a dirty bomb is detonated, there may be airborne radioactive material that can be inhaled as well as settle on an individuals leading to external contamination.

Burns, Kimberly A.

2008-01-01T23:59:59.000Z

128

Homeland Security/Forensics/Human Identity Programs and ...  

Science Conference Proceedings (OSTI)

... Digital PCR Last Updated Date: 04/26/2013 Digital PCR (dPCR) is a method used to quantify nucleic acids (DNA, RNA, cDNA). ...

2010-12-01T23:59:59.000Z

129

Department of Homeland Security Urban Search and Rescue ...  

Science Conference Proceedings (OSTI)

... and Technology (NIST) to develop comprehensive standards related to the development, testing, and certification of effective technologies for ...

2013-05-30T23:59:59.000Z

130

JOM-e: Issues and Opportunities in Homeland Security  

Science Conference Proceedings (OSTI)

A grand challenge for such an effort would be to develop technologies to allow people to live independently ten years longer. The application of technology to ...

131

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

132

No More Secrets: National Security S t r a t e g i e s  

E-Print Network (OSTI)

Macmillan series, Initiatives in Strategic Studies: Issues and Policies. He joined NPS in 1990 after, Contemporary Security Policy, Defense Analysis, Harvard International Review, Homeland Security Affairs, Intelligence and National Security, International Journal of Intelligence and Counterintelligence

Acton, Scott

133

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

134

Environmental Security and Restoration [EVS Program Area]  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Security and Restoration Environmental Security and Restoration EVS focuses on environmental and human health aspects of homeland and national security, as well as restoration of sites contaminated with hazardous materials. Contamination in our environment - in air, water, and soil - contributes to health problems and affects the quality of our lives. The EVS Division confronts this challenge by addressing environmental and human health aspects of homeland and national security and by characterizing and restoring sites contaminated with hazardous materials. We integrate extensive expertise in engineering, health physics, hydrogeology, environmental science, chemistry, spatial analysis, database management, and computer programming to contribute to environmental security and restoration.

135

The Drinking Water Security and Safety Amendments of 2002: Is America's Drinking Water Infrastructure Safer Four Years Later?  

E-Print Network (OSTI)

NAT'L STRATEGY FOR HOME- LAND SECURITY, supra note 50, at 9.on Creating the Home- land Security Department, supra noteM. Merriam, Homeland Security Begins At Home: Local Planning

Shermer, Steven D.

2006-01-01T23:59:59.000Z

136

NNSA takes part in 'DHS Day on the Hill' | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Blumenthal. Also in photo are Bill Beal, from the Remote Sensing Laboratory (RSL) at Joint Base Andrews and Bob Allen and Chris Lee from Chainbridge Technologies. NNSA takes...

137

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

138

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

139

ORISE: Recent Graduate Research Experiences - Lindsay Gabbert  

NLE Websites -- All DOE Office Websites (Extended Search)

by the U.S. Department of Homeland Security (DHS) and the U.S. Department of Agriculture, accepts scientists at all levels and provides them with laboratory experience and...

140

Control Systems Security Standards: Accomplishments And Impacts |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Durling, R L; Price, D E; Spero, K K

2005-06-06T23:59:59.000Z

142

Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

DOE Green Energy (OSTI)

For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

Durling, Jr., R L; Price, D E; Spero, K K

2005-01-03T23:59:59.000Z

143

Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management  

DOE Green Energy (OSTI)

The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Durling, Jr., R L; Price, D E

2005-12-16T23:59:59.000Z

144

Primer Control System Cyber Security Framework and Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

145

Watch What I Do, Not What I Say: The Unintended Consequences of the Homeland Investment Act  

E-Print Network (OSTI)

This paper analyzes the impact on firm behavior of the Homeland Investment Act of 2004, which provided

Dhammika, Dharmapala

146

Slide 1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Homeland Security Homeland Security and Recovery Act Contracting 10 th Annual U.S. Department of Energy Small Business Conference Small Businesses Leading the Way to Recovery and Reinvestment Phyllis Miriashtiani Page # Department of Homeland Security 8 Major DHS Buying Activities: Customs & Border Protection DHS Headquarters Office of Procurement Operations Federal Emergency Management Agency Federal Law Enforcement Training Center Immigration & Customs Enforcement Small Businesses Leading the Way to Recovery and Reinvestment Phyllis Miriashtiani Page # * Transportation Security Administration * U.S. Coast Guard * U.S. Secret Service Customs and Border Protection (CBP) * Protects America's borders against terrorists and other criminals, while facilitating trade and

147

DHS National Technical Nuclear Forensics Program FY 10 Summary Report: Graduate Mentoring Assistance Program (GMAP)  

SciTech Connect

This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. The summary report details the student/mentor experience and future plans after the first summer practicum. This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. This final written report includes information concerning the overall mentoring experience, including benefits (to the lab, the mentors, and the students), challenges, student research contributions, and lab mentor interactions with students home universities. Idaho National Laboratory hosted two DHS Nuclear Forensics graduate Fellows (nuclear engineering) in summer 2011. Two more Fellows (radiochemistry) are expected to conduct research at the INL under this program starting in 2012. An undergraduate Fellow (nuclear engineering) who worked in summer 2011 at the laboratory is keenly interested in applying for the NF Graduate Fellowship this winter with the aim of returning to INL. In summary, this program appears to have great potential for success in supporting graduate level students who pursue careers in nuclear forensics. This relatively specialized field may not have been an obvious choice for some who have already shown talent in the traditional areas of chemistry or nuclear engineering. The active recruiting for this scholarship program for candidates at universities across the U.S. brings needed visibility to this field. Not only does this program offer critical practical training to these students, it brings attention to a very attractive field of work where young professionals are urgently required in order for the future. The effectiveness of retaining such talent remains to be seen and may be primarily controlled by the availability of DOE laboratory research funding in this field in the years to come.

Martha R. Finck Ph.D.

2011-10-01T23:59:59.000Z

148

2002 TMS Fall Meeting: Opportunities and Issues in Homeland ...  

Science Conference Proceedings (OSTI)

The National Nuclear Security Administration (NNSA) laboratories (Sandia, Los Alamos, and Lawrence Livermore National Laboratories) were scientific and ...

149

Chapter_1_Physical_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

150

Nuclear Forensics | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Forensics | National Nuclear Security Administration Forensics | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Forensics Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Nuclear Forensics Nuclear Forensics Forensics Operations The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security

151

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

152

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

153

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

154

How to prepare the National Guard's leadership for successful venture in homeland security .  

E-Print Network (OSTI)

??The National Guard (NG) will be the first military force on disaster scenes in the United States. If the NG is to respond as efficiently… (more)

Amundson, Randy J.

2009-01-01T23:59:59.000Z

155

Northwest Regional Technology Center, October 2011 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

management system to be piloted in a Los Angeles exercise New guidance on nuclear and chemical response then be vetted in other interested cities and states in the Northwest Region. The final concept and procedure will help transition this technology for use nationwide. DHHS Issues Guidance on Nuclear and Chemical

156

Northwest Regional Technology Center, May 2011 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

national standards for disaster prepared- ness, response, and recovery systems. The county then documented by the Pacific Northwest National Laboratory (PNNL), to support regional preparedness, resiliency, response Program, allows emergency response agencies to engage with each other and leverage their collective

157

Before the Subcommittee on Financial and Contracting Oversight- Committee on Homeland Security and Governmental Affairs  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Overview of DOE Office of Environmental Management acquisitions and contract project management reforms By: J.E. "Jack" Surash, Deputy Assistant Secretary for Acquisition and Project Management

158

Current State of Commercial Radiation Detection Equipment for Homeland Security Applications  

Science Conference Proceedings (OSTI)

Detectors / Special Issue on the 11th International Conference on Radiation Shielding and the 15th Topical Meeting of the Radiation Protection and Shielding Division (Part 1) / Radiation Measurements and Instrumentation

Raymond T. Klann; Jason Shergur; Gary Mattesich

159

Northwest Regional Technology Center, May 2013 Page 1 of 2 Around The Region In Homeland Security  

E-Print Network (OSTI)

by the Pacific Northwest National Laboratory (PNNL), to support regional preparedness, resiliency, response Events Next-Generation Communications Inoperability Virtual Workshop PNNL hosted a Next including Lync, LiveWall and Twitter. The purpose of the workshop, organized by PNNL's Jon Barr, Jessica

160

DOE O 484.1 Admin Chg 1, Reimbursable Work for the Department of Homeland Security  

Directives, Delegations, and Requirements

The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of ...

2006-08-17T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Agency interoperation for effective data mining in border control and homeland security applications  

Science Conference Proceedings (OSTI)

US Customs embarked on a major modernization initiative of its Information Technology systems. Drawing in data from Customs trade systems, targeting inspectors review manifest information as well as strategic and tactical intelligence to determine which ...

Nabil R. Adam; Vijayalakshmi Atluri; Rey Koslowski; Vandana P. Janeja; Janice Warner; Aabhas Paliwal

2005-05-01T23:59:59.000Z

162

Integration of sensing and computing in an intelligent decision support system for homeland security defense  

Science Conference Proceedings (OSTI)

We propose an intelligent decision support system based on sensor and computer networks that incorporates various component techniques for sensor deployment, data routing, distributed computing, and information fusion. The integrated system is deployed ... Keywords: Data routing, Distributed computing, Dynamic programming, Intelligent decision support system, Sensor deployment, Sensor fusion

Qishi Wu; Mengxia Zhu; Nageswara S. V. Rao

2009-04-01T23:59:59.000Z

163

Improving National and Homeland Security through a proposed Laboratory for Information Globalization and Harmonization Technologies (LIGHT)  

E-Print Network (OSTI)

A recent National Research Council study found that: "Although there are many private and public databases that contain information potentially relevant to counter terrorism programs, they lack the ...

Choucri, Nazli

2004-11-30T23:59:59.000Z

164

Improving National and Homeland Security through a proposed Laboratory for nformation Globalization and Harmonization Technologies (LIGHT)  

E-Print Network (OSTI)

A recent National Research Council study found that: "Although there are many private and public databases that contain information potentially relevant to counter terrorism programs, they lack the ...

Choucri, Nazli

2004-12-10T23:59:59.000Z

165

287 Security Blunders You Should Avoid  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Blunders ! Security Blunders ! You Should Avoid" Jon S. Warner, Ph.D. Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory 630-252-6168 rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat Presentation for the ASIS International Annual Meeting! Anaheim, CA, September 21-24, 2009! Sponsors! *! DHS! *! DoD! *! DOS! *! IAEA! *! Euratom! *! DOE/NNSA! *! private companies! *! intelligence agencies! *! public interest organizations! The VAT has done detailed ! vulnerability assessments on! hundreds of different security! devices, systems, & programs.! Vulnerability Assessment Team (VAT)" The greatest of faults, I should say, is to be conscious of none. -- Thomas Carlyle (1795-1881) A multi-disciplinary team of physicists,

166

Control Systems Cyber Security Standards Support Activities  

Science Conference Proceedings (OSTI)

The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

Robert Evans

2009-01-01T23:59:59.000Z

167

Standards Applicability to Honeywell Metropolis Works Uranium Conversion Facility and  

E-Print Network (OSTI)

The purpose of this paper is to provide the Commission options and a staff recommendation for regulating chemical security at U.S. Nuclear Regulatory Commission (NRC) regulated facilities that are exempt from the Department of Homeland Security’s (DHS) Chemical Facility Anti-Terrorism Standards (CFATS). SUMMARY:

R. W. Borchardt

2011-01-01T23:59:59.000Z

168

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

169

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

170

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

171

LA-UR-07-6494 An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA  

E-Print Network (OSTI)

LA-UR-07-6494 An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA-6494 An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA · Homeland by Los Alamos National Security LLC for DOE/NNSA Your Letter of Interest should include the following

172

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A – Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

173

Critical reflection in a digital media artwork - Playas: homeland mirage  

E-Print Network (OSTI)

The introduction of digital media into the working practice of artists has produced challenges previously unknown to the field of art. This inquiry follows an atypical model of artist-driven research derived from disciplines such as social science and education. Here, an artwork functions as a model that is self-reflective, integrating methodologies in a form that benefits art and science. Using Naturalistic Inquiry, including semi-structured interviews of fifteen participants, the work illustrates a process of creation, analysis and evaluation that places the values of the artist on equal footing with the needs of science. Recently, artists have begun using video game engines as a tool to produce 3D navigable spaces. Using the hybrid video game/installation Playas: Homeland Mirage as a case study, this research examines the impact of technology on the artwork and identifies a number of key issues related to the function of critical reflection in this environment. Rules-of-play were a fundamental pre-requisite to the stimulation of critically reflective experience. The human interface with software and hardware was also a primary factor in reflective experience. Based on participant evaluation and observation, the interface was altered in response to its effect on critical reflection, illustrating how choices in this area impact aesthetic experience. Those with experience in visual art were more likely to engage the work in a critically reflective manner than seasoned video game players who tended to be more interested in scoring and winning. These findings and others inform our understanding of the stimulation of critical reflection in immersive environments and show how we can sensitively integrate technology with meaningful evaluative methods. By repurposing a video game in this manner, we learn about the nature of the video game and the nature of art. This research enables artists to gain a better understanding of the medium to more fully integrate technology within a meaningful practice. Conversely, other fields will benefit from a better understanding of the stimulation of meaning in immersive spaces and gain a comprehensive view of a work that strives to contribute to our culture on a deeper level than as simple entertainment. Ultimately, more fully understanding critical reflection in virtual environments will enable us to create enriched experiences that transcend space to create “real” or “virtual” place.

Stenner, Jack Eric

2007-08-01T23:59:59.000Z

174

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

175

Key to Security: Biometrics Standards Video Transcript  

Science Conference Proceedings (OSTI)

... Affairs. Produced by. Visual Edge Productions, LLC Bethesda, Maryland. Stock footage provided by DHS US-VISIT. The display ...

2010-10-05T23:59:59.000Z

176

 

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

[pic] [pic] PREFACE Name of Exercise is sponsored by the Name of Sponsoring Organization in cooperation with the Department of Energy's Transportation Emergency Preparedness Program (TEPP). This Exercise Plan (ExPlan) follows Department of Homeland Security (DHS) guidance, but for simplicity encompasses all required DHS documents, including the Controller and Evaluator (C/E) Handbook, Master Scenario Events List (MSEL), Actor Handbook, Exercise Evaluation Guides. This manual was produced with input, advice, and assistance from the Exercise Planning Team, which followed the guidance set forth in the Federal Emergency Management Agency (FEMA), Homeland Security Exercise and Evaluation Program (HSEEP). The ExPlan provides controllers and evaluators detailed information about

177

Security Forms and Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

178

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

179

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

180

R&D for Better Nuclear Security: Radiation Detector Materials  

SciTech Connect

I am going to talk about the need for better materials for radiation detectors. I believe that government investment in this area can enable transformational technology change that could impact domestic nuclear security and also national nuclear security in some very positive and powerful ways. I'm not going to give you a lecture on how radiation detectors work, but I am going to tell you a bit about today's off-the-shelf technology and why it is not sufficient, what we need, and what security benefit you could get from improvements. I think we're at a critical point in time for some very impactful investments. In particular I'm going to focus on the use of gamma-ray radiation detectors at ports of entry. Not long before DHS was formed, Congress decreed that counter measures against the delivery of radiological and nuclear threats would be put in place at US ports of entry, under the authority of US Customs (later Customs and Border Protection in DHS). This included the screening of all cars and trucks passing through a port of entry. Existing off-the-shelf radiation detectors had to be selected for this purpose. Plans were made to make the most of the available technologies, but there are some inherent limitations of these detectors, plus the operational setting can bring out other limitations.

Kammeraad, J E

2009-04-02T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

R&D for Better Nuclear Security: Radiation Detector Materials  

SciTech Connect

I am going to talk about the need for better materials for radiation detectors. I believe that government investment in this area can enable transformational technology change that could impact domestic nuclear security and also national nuclear security in some very positive and powerful ways. I'm not going to give you a lecture on how radiation detectors work, but I am going to tell you a bit about today's off-the-shelf technology and why it is not sufficient, what we need, and what security benefit you could get from improvements. I think we're at a critical point in time for some very impactful investments. In particular I'm going to focus on the use of gamma-ray radiation detectors at ports of entry. Not long before DHS was formed, Congress decreed that counter measures against the delivery of radiological and nuclear threats would be put in place at US ports of entry, under the authority of US Customs (later Customs and Border Protection in DHS). This included the screening of all cars and trucks passing through a port of entry. Existing off-the-shelf radiation detectors had to be selected for this purpose. Plans were made to make the most of the available technologies, but there are some inherent limitations of these detectors, plus the operational setting can bring out other limitations.

Kammeraad, J E

2009-04-02T23:59:59.000Z

182

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

183

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

184

Process Control Systems in the Chemical Industry: Safety vs. Security  

Science Conference Proceedings (OSTI)

Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

Jeffrey Hahn; Thomas Anderson

2005-04-01T23:59:59.000Z

185

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

186

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

187

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

188

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

189

National Security Technology Incubator Business Plan  

SciTech Connect

This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

2007-12-31T23:59:59.000Z

190

National Security & Safety Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 2, 2012 July 2, 2012 Inspection Report: INS-O-12-02 Management of Explosives at Selected Department Sites June 29, 2012 Audit Report: OAS-M-12-05 Office of Secure Transportation Capabilities May 31, 2012 Audit Report: IG-0866 Integrated Safety Management at Sandia National Laboratories April 23, 2012 Audit Report: OAS-L-12-05 The Joint Actinide Shock Physics Experimental Research Facility at the Nevada National Security Site March 6, 2012 Inspection Report: INS-L-12-02 Follow-up Inspection on Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory February 28, 2012 Audit Report: IG-0860 The Department of Energy's Implementation of Homeland Security Presidential Directive 12 November 15, 2011 Evaluation Report: OAS-M-12-01 The Federal Energy Regulatory Commission's Unclassified Cyber Security

191

Subsidized Security and Stability of Equilibrium Solutions in an N-Player Game with Errors ?  

E-Print Network (OSTI)

Optimizing resource allocation in interdependent security problems is a serious challenge for U.S. homeland security. In this paper, game theory is applied to this challenge in the case where investment by one defender has positive externalities for other players. The phenomena of tipping and cascading are discussed, and we explore how to target subsidized security in order to achieve the best results from tipping. We show that subsidization of security investments can increase the stability of equilibrium solutions, and also decrease the total expected social costs. The above findings are illustrated in numerical examples. 1

Jun Zhuang; Vicki M. Bier

2006-01-01T23:59:59.000Z

192

Magical Seals, Secure Voting Machines, and Other Fantasies  

NLE Websites -- All DOE Office Websites (Extended Search)

Magical Seals, Magical Seals, Secure Voting Machines, and Other Fantasies Roger G. Johnston, Ph.D., CPP Jon S. Warner, Ph.D. Vulnerability Assessment Team! Argonne National Laboratory! ! ! 630-252-6168 rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat! Invited Talk for the Election Verification Network Meeting, Chicago, March 24-26, 2011 Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security

193

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

194

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

195

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

196

Coordination and Collaboration Quarterly Newsletter  

Science Conference Proceedings (OSTI)

This newsletter discusses the Electric Power Research Institute (EPRI) 161E Program effort to identify, support, and facilitate coordination and collaboration among the key institutional players in the electric sector today. Topics include the following: North American Electric Reliability Council's (NERC's) evolving role Federal Energy Regulatory Commission's (FERC's) expanding role DOE's collaboration efforts Department of Homeland Security's (DHS's) coordination efforts United States Computer Emerge...

2011-05-31T23:59:59.000Z

197

The United States Intelligence Community (IC), an integrated network of agencies that work together to protect our Nation's  

E-Print Network (OSTI)

The United States Intelligence Community (IC), an integrated network of agencies that work together· Note: Not all opportunities are available at all agencies. * Proficiency in one of the following Agency (CIA)· Defense Intelligence Agency (DIA)· Department of Homeland Security (DHS)· Federal Bureau

Memphis, University of

198

National Security Technology Incubation Strategic Plan  

Science Conference Proceedings (OSTI)

This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

None

2007-01-01T23:59:59.000Z

199

Multi-Modal Integrated Safety, Security & Environmental Program Strategy  

SciTech Connect

This paper describes an approach to assessing and protecting the surface transportation infrastructure from a network science viewpoint. We address transportation security from a human behavior-dynamics perspective under both normal and emergency conditions for the purpose of measuring, managing and mitigating risks. The key factor for the planning and design of a robust transportation network solution is to ensure accountability for safety, security and environmental risks. The Oak Ridge National Laboratory (ORNL) Multi-Modal Integrated Safety, Security and Environmental Program (M2IS2EP) evolved from a joint US Department of Energy (DOE) Oak Ridge Office (ORO) Assets Utilization Program and ORNL SensorNet Program initiative named the Identification and Monitoring of Radiation (in commerce) Shipments (IMRicS). In November of 2002 the first of six pilot demonstrations was constructed at the Tennessee I-40/75 Knox County Weigh Station outside of Knoxville. Over the life of the project four more installations were deployed with various levels of ORNL oversight. In October of 2004 the ORNL SensorNet Program commissioned a research team to develop a project plan and to identify/develop a strategic vision in support of the SensorNet Program, keeping in mind the needs of the various governmental constituencies (i.e., DOT/DHS/EPA) for improving the safety/security/environment of the highway transportation system. Ultimately a more comprehensive ORNL SensorNet Program entitled Trusted Corridors was established and presented to ORNL, DOE, DOT, DHS, EPA and State leaders. Several of these entities adopted their own versions of these programs and are at various stages of deployment. All of these initiatives and pilots make up the foundation of the concepts and ideas of M2IS2EP and will be discussed further on in this paper.

Walker, Randy M [ORNL; Omitaomu, Olufemi A [ORNL; Ganguly, Auroop R [ORNL; Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL

2008-01-01T23:59:59.000Z

200

DHS SSP Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Energy Energy Sector-Specific Plan An Annex to the National Infrastructure Protection Plan 2010 i Preface In its role as the lead Sector-Specific Agency for the Energy Sector, the Department of Energy has worked closely with dozens of government and industry partners to prepare this updated 2010 Energy Sector-Specific Plan (SSP). Much of that work was con- ducted through the two Energy Sector Coordinating Councils (SCCs) and the Energy Government Coordinating Council (GCC). The Electricity SCC and the Oil and Natural Gas SCC comprise the Energy SCC and represent the interests of their respective industries. The Energy GCC represents all levels of government - Federal, State, local, territorial, and tribal - that are concerned with the Energy Sector.

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DHS Written Report  

SciTech Connect

Recently, a new galactic cosmic-ray (GCR) source option [1] was implemented in the all-energy, all-particle transport code MCNP6 [2]. In this paper, we made use of this feature to calculate surface neutron and photon background fluxes on a terrestrial grid around the earth. These spectra have been incorporated into Release 2 of the 'background.dat' file, which is read and sampled by MCNP6 whenever a user invokes the background source option [2]. Cosmic radiation bombards Earth with various particles, such as protons and {alpha} particles, some of which are deflected by the Earth's shielding magnetic field. Particles that carry sufficient energy can overcome the deflection and penetrate into the atmosphere. The sufficient energy is dependent on the terrestrial coordinates due to the magnetic force's proportionality to the sine of the angle between the velocity vector of the incoming particle and the magnetic field. As the particles propagate through the atmosphere, collisions with atmospheric molecules generate new particles such as neutrons, protons, photons, muons, pions, and other exotic particles. These secondary often have sufficient energy to undergo additional nuclear interactions, and so on, forming what is known as a cascade shower. The tabulation of background particle fluxes on the surface of the earth is important for a variety of reasons, one of which is the design of nuclear material detection systems. The simulations used various models and formulations for the cosmic source spectra, atmosphere, and terrestrial conditions to correctly model the propagation of GCR particles through the atmosphere to surface level.

Palomares, Javier [Los Alamos National Laboratory

2012-08-31T23:59:59.000Z

202

DHS1028.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and the Office of the Deputy Assistant Secretary for Naval 2 Petroleum and Oil Shale Reserves (NPOSR), who were involved in evaluating Chevron's unsolicited proposal and...

203

DHS Letter ??? MERRTT Approval  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Environmental Management U.S. Department of Energy Washington, D.C. 20585 RE: Modular Emergency Response Radiological Transportation Training (MERRTT) Dear Ms. McNeil: Ms....

204

DHS Strategic Goals  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Obtaining this image from satellites was possible only by America's multibillion-dollar space program over 4 decades. The infrastructure it shows represents perhaps a...

205

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

206

SecureBox: National Security Through Secure Cargo – Team Members  

SecureBox: National Security Through Secure Cargo – Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

207

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

208

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

209

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

210

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

211

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

212

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

213

Contact Us | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

214

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

215

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

216

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

217

Argonne Chemical Sciences & Engineering - People - National Security -  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security National Security Nuclear Forensics and Nanoscale Engineering Chemical Analysis and Research Analytical Chemistry Laboratory Management and Support David B. Chamberlain, Chemical Engineer and Department Manager phone: 630/252-7699, fax: 630/972-4409, e-mail: david.chamberlain@anl.gov M.S., Chemical Engineering, University of Idaho Spent fuel reprocessing Radiological forensics Sealed radioactive source characterization Radioactive materials and national security Mary Anne Yates, Senior Technical Advisor/Senior Chemist phone: 630/252-7699, fax: 630/972-4409, e-mail: mayates@anl.gov Ph.D., Nuclear Chemistry, Carnegie Mellon University Homeland Security Counterterrorism Publications in nuclear, atomic, and particle physics Jodi L. Canaday, Administrative Secretary

218

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

219

Technology Capabilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security & Defense Homeland Security & Defense Information Technology & Communications Information Technology & Communications Sensors, Electronics &...

220

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

222

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

223

Annual Report on the Activities and Publications of the DHS-DNDO-NTNFC-Sponsored Post-doctoral Fellow at Los Alamos National Laboratory  

SciTech Connect

This report is a summary update on the projects Magen Coleman is working on as a postdoctoral fellow funded by DHS. These research projects are designed to explore different radioanalytical facets of nuclear forensics, including destructive and non-destructive analysis, chronometry measurements and modeling, spectral analysis, and actinide separations. Method development and instrumental analysis are integral parts of these projects, along with strong radiochemical knowledge. The current projects discussed here include method development for {sup 232}U analysis, the assembly of a gamma mapping system, the testing of neutron bubble detectors for neutron spectrometry, and continued work on the chronometry of plutonium and uranium materials. This report documents the work that has been performed since April 2011.

Coleman, Magen E. [Los Alamos National Laboratory; Tandon, Lav [Los Alamos National Laboratory

2012-04-24T23:59:59.000Z

224

A Report on the Activities, Publications, and Pending Research of DHS/DOD Sponsored Post-doctoral Research Associate at Los Alamos National Laboratory  

Science Conference Proceedings (OSTI)

Since beginning at Los Alamos National Laboratory in February of 2012, I have been working as a DHS./DNDO Postdoctoral Research Associate under the mentorship of Lav Tandon and Khalil Spencer (NA-22 and mass spectrometry). The focus of my efforts, in addition to pursuing needed training and qualifications, has been the application of various instrumental approaches (e.g. Thermal Ionization Mass Spectrometry; TIMS) to a range of systems of interest in materials characterization and nuclear forensics. Research to be pursued in the coming months shall include the continued use of such approaches to advance current methods for: modified total evaporation, monitoring critical minor isotope systems, and chronometry. Each of the above points will be discussed.

Stanley, Floyd E. [Los Alamos National Laboratory; Tandon, Lav [Los Alamos National Laboratory

2012-04-26T23:59:59.000Z

225

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

226

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

227

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

228

Partnering with Utilities for Energy Efficiency & Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPIDERS SPIDERS Energy Security JCTD Proposal Dr. George Ka'iliwai Mr. Wade Jost USPACOM J8, Director of OSD Power Surety y Task Force Resources and Assessment The RedGate Group This brief is: This brief is: UNCLASSIFIED 1 UNCLASS As of Nov 09 The Situation * "Critical national security y and homeland defense missions are at an unacceptably high risk of extended outage from failure of the electric grid." The Defense Science Board Task Force on DoD Energy Security, July 2008 UNCLASS 2 UNCLASS As of Nov 09 The Situation * "There have been numerous attacks on the operating systems of major critical infrastructure facilities, including power grids, around the world in recent years: Chinese and Russian spies have "penetrated the U S penetrated the U.S.

229

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

230

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

231

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

232

Best Practices for the Security of Radioactive Materials  

Science Conference Proceedings (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

233

Risk Analysis, Vol. 30, No. 4, 2010 DOI: 10.1111/j.1539-6924.2010.01370.x Deceptive Detection Methods for Effective Security with  

E-Print Network (OSTI)

no increase in inspection cost. KEY WORDS: Homeland security; mixed strategies; nuclear detection; screening catastrophic weapons, such as chemical or biological agents or nuclear de- vices, requires high vigilance.kantor@rutgers.edu. traffic through ports and harbors. When we consider the further problem of protecting cities and high

234

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

235

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

236

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

237

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

238

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

239

Reliable Priority-Access Communication Infrastructure for Major Outage Recovery Operations  

Science Conference Proceedings (OSTI)

This report identifies and defines requirements for a secure land mobile radio (LMR) voice and data communication system to ensure interoperability between utility companies and federal, state, and local public safety agencies. The project defines a collaborative effort between the electric power industry and the United States government, specifically with the Department of Homeland Security (DHS). This report describes Phase I, which consists of a scoping study focused on the identification and definiti...

2003-11-20T23:59:59.000Z

240

ORISE: Undergraduates Research Experiences - Eric Dulmes  

NLE Websites -- All DOE Office Websites (Extended Search)

Eric Dulmes Eric Dulmes Student's explosive analysis could lead to safer skies Eric Dulmes, Aircraft Explosions, U.S. Department Homeland Security, Transportation Security Laboratory Hope College student Eric Dulmes measures the impulse of test aircraft explosions using a high-speed video as part of his internship with U.S. Department of Homeland Security's Transportation Security Laboratory. Hope College undergraduate Eric Dulmes-who is majoring in mechanical engineering-recently participated in an internship at the U.S. Department of Homeland Security's (DHS) Transportation Security Laboratory (TSL) under Chih-Tsai Chen, Ph.D., in the Explosives Effects Laboratory. At TSL, his research team focused on the characterization of explosives and blast effects that will support aircraft vulnerability testing and

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

242

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

243

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

244

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

245

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

246

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

247

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

248

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

249

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

250

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

251

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

252

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

253

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

254

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

255

Finding of No Significant Impact Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nevada Test Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RADIOLOGICAL/NUCLEAR COUNTERMEASURES TEST AND EVALUATION COMPLEX, NEVADA TEST SITE The U.S. Department of Homeland Security (DHS) is the Federal organization charged with defending the borders of the United States under the authority the Homeland Security Act of 2002 (Public Law 107-296). The DHS requested the National Nuclear Security Administration (NNSA) to develop at the Nevada Test Site (NTS) a complex for testing and evaluating countermeasures for interdicting potential terrorist attacks using radiological and/or nuclear weapons of mass destruction. In response to that request, NNSA proposes to construct, operate, and maintain the Radiological/Nuclear Countermeasures Test and Evaluation Complex (Rad/NucCTEC). NNSA has prepared an Environmental Assessment (DOE/EA-1499) (EA) which analyzes the potential

256

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

257

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

258

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

259

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

260

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Site Visits by US Dept of Homeland Security regarding H-1B employees at Stanford University If your Department has sponsored H-1B employees, it is possible that the U.S. Department of Homeland  

E-Print Network (OSTI)

;OFFICe OF InSpeCtOr GenerAl I SemIAnnuAl repOrt #12; I AprIl 1­September 30, 2007 Robert W. Cobb Inspector General from The InspeCTor General #12;OFFICe OF InSpeCtOr GenerAl I SemIAnnuAl repOrt #12; I Apr executIve offIcer Renee N. Juhans counsel to the Inspector General Francis P. LaRocca offIce of au

Ford, James

262

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

263

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

264

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

265

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

266

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

267

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

268

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

269

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring … ...

2013-01-17T23:59:59.000Z

270

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

271

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

272

8th Annual IT Security Automation Conference and Expo ...  

Science Conference Proceedings (OSTI)

... Richard Spires (DHS), FedRAMP onto Cloud First: A CIO's Direction. ... Inc), Hacking Databases: Exploiting The Top Database Vulnerabilities And ...

2012-11-02T23:59:59.000Z

273

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

274

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

275

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

276

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

277

Measurable Control System Security through Ideal Driven Technical Metrics  

Science Conference Proceedings (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

2008-01-01T23:59:59.000Z

278

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

279

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

280

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

282

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

283

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

284

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

285

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

286

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

287

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

288

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

289

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

290

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

291

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

292

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

293

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

294

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

295

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

296

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

297

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

298

Emergency response robot evaluation exercise  

Science Conference Proceedings (OSTI)

More than 60 robot test methods are being developed by a team led by the National Institute of Standards and Technology (NIST) with the sponsorship of U.S. Department of Homeland Security (DHS). These test methods are being specified and standardized ... Keywords: HRI, capability, emergency response, evaluation, human-robot interaction, measure, metrics, mobility, performance, power, radio communications, repetition, robot, sensor, standard, task, test, test method, test suite, trial

Adam Jacoff; Hui-Min Huang; Ann Virts; Anthony Downs; Raymond Sheh

2012-03-01T23:59:59.000Z

299

Nuclear Power Plant Risk Analysis and Management for Critical Asset Protection (RAMCAP) Trial Applications Summary Report  

Science Conference Proceedings (OSTI)

The nuclear power plant risk analysis and management for critical asset protection (NPP RAMCAP ) methodology provides a common, high-level framework for evaluating NPP risk from terrorist attacks that plant owners/operators can use. Development of this method has been coordinated with other U.S. Department of Homeland Security (DHS) efforts in order to enable a consistent risk characterization among all critical infrastructure sectors. This effort culminated in a generic RAMCAP methodology potentially ap...

2005-12-22T23:59:59.000Z

300

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

302

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

303

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

304

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management • Architecture security focus • Physical interaction ... Cybersecurity • Cybersecurity Framework • Smart Grid Program ...

2013-06-05T23:59:59.000Z

305

DHS Summary Report -- Robert Weldon  

Science Conference Proceedings (OSTI)

This summer I worked on benchmarking the Lawrence Livermore National Laboratory fission multiplicity capability used in the Monte Carlo particle transport code MCNPX. This work involved running simulations and then comparing the simulation results with experimental experiments. Outlined in this paper is a brief description of the work completed this summer, skills and knowledge gained, and how the internship has impacted my planning for the future. Neutron multiplicity counting is a neutron detection technique that leverages the multiplicity emissions of neutrons from fission to identify various actinides in a lump of material. The identification of individual actinides in lumps of material crossing our boarders, especially U-235 and Pu-239, is a key component for maintaining the safety of the country from nuclear threats. Several multiplicity emission options from spontaneous and induced fission already existed in MCNPX 2.4.0. These options can be accessed through use of the 6th entry on the PHYS:N card. Lawrence Livermore National Laboratory (LLNL) developed a physics model for the simulation of neutron and gamma ray emission from fission and photofission that was included in MCNPX 2.7.B as an undocumented feature and then was documented in MCNPX 2.7.C. The LLNL multiplicity capability provided a different means for MCNPX to simulate neutron and gamma-ray distributions for neutron induced, spontaneous and photonuclear fission reactions. The original testing on the model for implementation into MCNPX was conducted by Gregg McKinney and John Hendricks. The model is an encapsulation of measured data of neutron multiplicity distributions from Gwin, Spencer, and Ingle, along with the data from Zucker and Holden. One of the founding principles of MCNPX was that it would have several redundant capabilities, providing the means of testing and including various physics packages. Though several multiplicity sampling methodologies already existed within MCNPX, the LLNL fission multiplicity was included to provide a separate capability for computing multiplicity as well as including several new features not already included in MCNPX. These new features include: (1) prompt gamma emission/multiplicity from neutron-induced fission; (2) neutron multiplicity and gamma emission/multiplicity from photofission; and (3) an option to enforce energy correlation for gamma neutron multiplicity emission. These new capabilities allow correlated signal detection for identifying presence of special nuclear material (SNM). Therefore, these new capabilities help meet the missions of the Domestic Nuclear Detection Office (DNDO), which is tasked with developing nuclear detection strategies for identifying potential radiological and nuclear threats, by providing new simulation capability for detection strategies that leverage the new available physics in the LLNL multiplicity capability. Two types of tests were accomplished this summer to test the default LLNL neutron multiplicity capability: neutron-induced fission tests and spontaneous fission tests. Both cases set the 6th entry on the PHYS:N card to 5 (i.e. use LLNL multiplicity). The neutron-induced fission tests utilized a simple 0.001 cm radius sphere where 0.0253 eV neutrons were released at the sphere center. Neutrons were forced to immediately collide in the sphere and release all progeny from the sphere, without further collision, using the LCA card, LCA 7j -2 (therefore density and size of the sphere were irrelevant). Enough particles were run to ensure that the average error of any specific multiplicity did not exceed 0.36%. Neutron-induced fission multiplicities were computed for U-233, U-235, Pu-239, and Pu-241. The spontaneous fission tests also used the same spherical geometry, except: (1) the LCA card was removed; (2) the density of the sphere was set to 0.001 g/cm3; and (3) instead of emitting a thermal neutron, the PAR keyword was set to PAR=SF. The purpose of the small density was to ensure that the spontaneous fission neutrons would not further interact and induce fissions (i.e. th

Weldon, Robert A. [Los Alamos National Laboratory

2012-07-31T23:59:59.000Z

306

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

307

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

308

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

309

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

310

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

311

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

312

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

313

ISPAB December 2006 Meeting Minutes & Presentations  

Science Conference Proceedings (OSTI)

... Common Security Requirement Language for Procurements & Maintenance Contracts Julio Rodriguez - Idaho National Laboratory, DHS. ...

314

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

315

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

316

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in today’s software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

317

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

318

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

319

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

320

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

323

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

324

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

325

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

326

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

327

Use of a virtual environment to solve real world problems The research involves a project for homeland security within the Modeling and Simulation  

E-Print Network (OSTI)

and Simulation Group has worked diligently to duplicate virtual nuclear facilities and power plants across certain components are attacked by terrorists. Certain components of a nuclear facility or power plant at the Oak Ridge National Laboratory. Using the Unreal Engine, nuclear facilities and other real-world plants

328

Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider  

E-Print Network (OSTI)

A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

Friedman, Peter S; Chapman, J Wehrley; Levin, Daniel S; Weaverdyck, Curtis; Zhou, Bing; Benhammou, Yan; Etzion, Erez; Moshe, M Ben; Silver, Yiftah; Beene, James R; Varner, Robert L

2010-01-01T23:59:59.000Z

330

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia  

Energy.gov (U.S. Department of Energy (DOE))

Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management

331

Deputy Assistant Secretary Jack Surash's Written Statement before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs (June 27, 2013)  

Energy.gov (U.S. Department of Energy (DOE))

Written Statement of Jack Surash, Deputy Assistant Secretary for Acquisition and Project Management of Office of Environmental Management, United States Department of Energy, before the...

332

Hearing on “Online Privacy, Social Networking, and Crime Victimization” Before the Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security U.S. House of Representatives  

E-Print Network (OSTI)

Washington, DCMr. Chairman and Members of the Committee, thank you for the opportunity to testify today. My name is Marc Rotenberg, and I am the President of the Electronic Privacy Information Center. EPIC was established to focus public attention on emerging privacy and civil liberties issue. I also teach Information Privacy Law at Georgetown University Law Center. I want to thank you for holding this hearing today and also thank Chairman Conyers for his May letter to Facebook. EPIC has a particular interest in privacy and social networking services. We filed two complaints at the Federal Trade Commission in the last year following decisions by Facebook to change its privacy policies and the privacy settings of its users. We also filed a complaint when Google introduced Buzz, its social network service, because the company essentially opted in all of its Gmail users. We believe it is vitally important to protect the privacy of users of these services, and many users agree. To be clear, we do not object to social network services—they are enormously valuable—but we do believe that there are serious privacy risks to

Marc Rotenberg

2010-01-01T23:59:59.000Z

333

Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider  

E-Print Network (OSTI)

A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

Peter S. Friedman; Robert Ball; J. Wehrley Chapman; Daniel S. Levin; Curtis Weaverdyck; Bing Zhou; Yan Benhammou; Erez Etzion; M. Ben Moshe; Yiftah Silver; James R. Beene; Robert L. Varner Jr.

2010-07-03T23:59:59.000Z

334

SRNL - News Room  

NLE Websites -- All DOE Office Websites (Extended Search)

Approved for DHS Testing Program Approved for DHS Testing Program ( PDF button Download printer-friendly, PDF version) SRS Health Physics Instrument Calibration Laboratory equipment that will be used for GRaDER testing: Low Scatter Irradiator. AIKEN, S.C. (June 9, 2010) - The Savannah River Site (SRS) has been approved by the U.S. Department of Homeland Security as one of the testing facilities associated with a new program designed to test radiation detection equipment. Radiation detectors are vital tools used by law enforcement personnel to interdict terrorists' use of radioactive material. This program helps ensure that equipment meets the appropriate standards for acceptance. The effort, managed by the DHS Domestic Nuclear Detection Office (DNDO) is called the Graduated Rad/Nuc Detector Evaluation and Reporting (GRaDER) Program.

335

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

336

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

337

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

338

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

339

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

340

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

342

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

343

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

344

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

345

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

346

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

347

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

348

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

349

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

350

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

351

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

352

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

353

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

354

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

355

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

356

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

Science Conference Proceedings (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

357

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

358

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

359

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

360

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

362

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

363

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

364

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

365

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

366

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

367

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

368

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

369

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

370

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

371

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

372

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

373

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

374

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

375

Risk assessment methodology applied to counter IED research & development portfolio prioritization  

SciTech Connect

In an effort to protect the United States from the ever increasing threat of domestic terrorism, the Department of Homeland Security, Science and Technology Directorate (DHS S&T), has significantly increased research activities to counter the terrorist use of explosives. More over, DHS S&T has established a robust Counter-Improvised Explosive Device (C-IED) Program to Deter, Predict, Detect, Defeat, and Mitigate this imminent threat to the Homeland. The DHS S&T portfolio is complicated and changing. In order to provide the ''best answer'' for the available resources, DHS S&T would like some ''risk based'' process for making funding decisions. There is a definite need for a methodology to compare very different types of technologies on a common basis. A methodology was developed that allows users to evaluate a new ''quad chart'' and rank it, compared to all other quad charts across S&T divisions. It couples a logic model with an evidential reasoning model using an Excel spreadsheet containing weights of the subjective merits of different technologies. The methodology produces an Excel spreadsheet containing the aggregate rankings of the different technologies. It uses Extensible Logic Modeling (ELM) for logic models combined with LANL software called INFTree for evidential reasoning.

Shevitz, Daniel W [Los Alamos National Laboratory; O' Brien, David A [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Chavez, Gregory M [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

376

Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)  

Science Conference Proceedings (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

377

Rationale and Development of a Security Assurance Index with Application toward the Development of a World Risk Index  

SciTech Connect

Assurance categories were previously developed to support the Department of Homeland Security’s efforts in the mitigation of Cyber Control System events. Defined according to the risk of life and economic loss, the minimum range is designated by policy, whereas the maximum limit seems to be constrained only by limits and interdependencies of the event. Use of this life / assets scale has proven to be helpful in managing risk due to the scale's ease of use, communication, and understanding. Suggestions have been made that this scale could be applied to all events of terror, disaster, and calamity of an international scale, with equally good results. This paper presents the history of some existing scales of disaster and assurance, the rationale behind the development of the original Security Assurance Index, and our proposed scale of disaster and calamity as a World Risk Index.

M. M. Plum; G. A. Beitel, PhD

2006-06-01T23:59:59.000Z

378

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

379

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

380

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

382

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

383

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

384

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

385

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

386

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

387

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

388

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

389

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

390

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

391

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

392

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

393

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

394

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

395

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

396

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

397

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

398

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

399

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow… (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

400

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

402

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

403

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

404

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

405

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

406

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

407

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Bürkle; Alice Hertel; Wilmuth Müller; Martin Wieser

2006-09-01T23:59:59.000Z

408

6 Homeland Defense Journal -December 18, 2002 | Vol 1. Issue 23 Gilmore Commission Calls for Independent Center to Coordinate Terrorism  

E-Print Network (OSTI)

, Washington DC. · How much will new security initiatives cost and who will end up paying for them? · Which allowed. The building walls are a metal composite, and standard glass windows are used. The receiver- cant levels are transmitted through the walls and windows. No inter- ception would be possible

Jenn, David C.

409

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

410

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

411

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

412

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

413

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

414

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

415

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

416

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

417

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

418

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

419

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

420

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

422

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

423

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

424

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

425

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

426

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

427

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

428

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

429

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

430

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

431

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

432

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

433

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

434

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

435

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

436

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

437

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

438

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

439

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

440

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

442

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

443

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

444

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

445

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

446

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

447

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

448

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

449

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

450

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

451

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI fĂĽr Informatik Univ. TĂĽbingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

452

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

453

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

454

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

455

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

456

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

457

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

458

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

459

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

460

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

462

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

463

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

464

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

465

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Sánchez; Eduardo Fernández-Medina

2010-06-01T23:59:59.000Z

466

The National Initiative for Cybersecurity Education (NICE)  

Science Conference Proceedings (OSTI)

... The National Cyber Security Division outlines the Department of Homeland Security's strategic national cybersecurity objectives. ...

2013-07-09T23:59:59.000Z

467

Audit Report: IG-0775  

Energy.gov (U.S. Department of Energy (DOE))

National Nuclear Security Administration's Construction of aRadiological/Nuclear Complex for Homeland Security

468

Sandia National Laboratories: Working with Sandia: Registration  

Energy, Climate, & Infrastructure Security; International, Homeland, & Nuclear Security; Working With Sandia; Procurement; Technology Partnerships;

469

Coaxial Mono-Energetic Gamma Generator for Active Interrogation  

E-Print Network (OSTI)

of Energy's National Nuclear Security Administration underof Homeland Security, Domestic Nuclear Detection Office

Ludewigt, Bernhard A.

2010-01-01T23:59:59.000Z

470

PNNL's Work for Others Program Enhancing technology transfer to the public and private sectors  

E-Print Network (OSTI)

, and Navy, as well as the Departments of Defense, Homeland Security, and National Security, the Nuclear

471

Nonproportionality of Scintillator Detectors: Theory and Experiment  

E-Print Network (OSTI)

part by the National Nuclear Security Administration, Officeof Homeland Security, Domestic Nuclear Detection Office and

Moses, William

2010-01-01T23:59:59.000Z

472

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

473

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

474

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

475

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

476

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

477

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

478

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

479

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

480

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

Note: This page contains sample records for the topic "homeland security dhs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

482

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

483

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

484

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

485

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

486

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

487

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

488

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

489

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

490

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

491

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

492

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

493

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

494

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

495

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

496

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

497

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

498

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

499

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

500

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders ...