National Library of Energy BETA

Sample records for homeland security dhs

  1. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-02-28

    To authorize a modified process for the acceptance, performance, and administration of work from the Department of Homeland Security (DHS) by Department of Energy (DOE) contractor and federally operated laboratories, sites, and other facilities.

  2. Homeland Security: What Can Data Science Do?

    E-Print Network [OSTI]

    , Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security "halves" of the DHS Center for Visual and Data Analytics (CVADA), founded as the CCI Center by DHS in 2009.g.: ŘAssessing risks in waterways (NJ DOT) ŘPlanning for evacuations during heat events from climate change (CDC

  3. Northwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Security (DHS) Domestic Nuclear Detection Office (DNDO), recently visited PNNL. The goals of the trip wereNorthwest Regional Technology Center, May 2014 Page 1 of 2 Around The Region In Homeland Security, and recovery. The center enables homeland security solutions for emergency responder communities and federal

  4. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  5. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    None

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  6. Modeling and Simulation of Hazardous Material Releases for Homeland Security Applications

    E-Print Network [OSTI]

    Magee, Joseph W.

    i Modeling and Simulation of Hazardous Material Releases for Homeland Security Applications DRAFT in the breakout track on Hazardous Material Release at the workshop on Homeland Security Modeling & Simulation...........................................................................................................................................................1 2. Introduction to Hazardous Material Releases (HMR) and Associated DHS Guidance

  7. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  8. Homeland security R&D roadmapping : risk-based methodological options.

    SciTech Connect (OSTI)

    Brandt, Larry D.

    2008-12-01

    The Department of Energy (DOE) National Laboratories support the Department of Homeland Security (DHS) in the development and execution of a research and development (R&D) strategy to improve the nation's preparedness against terrorist threats. Current approaches to planning and prioritization of DHS research decisions are informed by risk assessment tools and processes intended to allocate resources to programs that are likely to have the highest payoff. Early applications of such processes have faced challenges in several areas, including characterization of the intelligent adversary and linkage to strategic risk management decisions. The risk-based analysis initiatives at Sandia Laboratories could augment the methodologies currently being applied by the DHS and could support more credible R&D roadmapping for national homeland security programs. Implementation and execution issues facing homeland security R&D initiatives within the national laboratories emerged as a particular concern in this research.

  9. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  10. U.S. Homeland Security R&D Budgets

    SciTech Connect (OSTI)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  11. Homeland Security Issues for Facilities 

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01

    The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become...

  12. The Department of Homeland Security (DHS) Funding Opportunity Announcement (FOA)

    E-Print Network [OSTI]

    Rhode Island, University of

    on the "Search Grants" tab. Enter the FOA Number located on the cover of this announcement. Click and development activities. See "Appendix B - Terms and Conditions" for additional details of substantial

  13. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery for Homeland Security Information Management and Knowledge Discovery Authors Tamara Kolda, Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  14. Improving Vigilance for Homeland Security Personnel

    E-Print Network [OSTI]

    McShea, Daniel W.

    Improving Vigilance for Homeland Security Personnel Robert Hubal, PhD, RTI International Stephen labeled FAPV long employed by RTI. ­ Variation in simulated environment `parameters'. #12;· Focus: · Acquired materials from a separate RTI project. · Reusing simulation materials from another RTI project

  15. Before the Senate Homeland Security and Governmental Affairs...

    Energy Savers [EERE]

    and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland...

  16. The DHS CCICADA Center In July 2009, the U.S. Department of Homeland Security (DHS)

    E-Print Network [OSTI]

    Neimark, Alexander V.

    and computational foundations for deriving knowledge and practical understanding from massive amounts, uncertainty, and manipulation. - 2 - Risk Management Plans (RMP) No RMP Rainfall (P = probabilityof storm identification and attribution Response and planning for natural disasters Sensor location for nuclear

  17. Around The Region In Homeland Security January 2015

    E-Print Network [OSTI]

    ://biodetectionresource.pnnl.gov. Cybersecurity workshop showcases nationwide R&D The Cyber Security Division 2014 R&D Showcase and Technical collaboration and innovation. The 3-day event hosted by the DHS S&T Cyber Security Division welcomed researchers Center of Excellence, the mobile security application archiving technology was featured at the Cyber

  18. Reimbursable Work for the Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-17

    The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security.

  19. National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th

    E-Print Network [OSTI]

    Farritor, Shane

    Seminar: National Security Issues at Department of Homeland Security and Department of Energy Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, he

  20. Science and Technology Challenges for Homeland Security

    SciTech Connect (OSTI)

    Murray, C A

    2006-03-24

    Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as well. Improved biodetectors are needed--autonomous instruments that continuously monitor the environment for threat pathogens, promptly alert authorities in the event of a positive detection, and have an extremely low false alarm rate. Because many threat pathogens are endemic to various regions of the world, the natural microbial environment must be characterized so that background detections can be distinguished from a deliberate release. In addition, most current detection approaches require an a priori knowledge of the pathogens of concern and thus won't work in the face of a new, naturally occurring disease, such as a mutated avian influenza that effects humans, or a deliberately manipulated organism. Thus, we must move from species-specific detection to function-based detection based on a fundamental understanding of the mechanisms and genetic markers of infectivity, pathogenicity, antibiotic resistance, and other traits that distinguish a harmful organism from an innocuous one. Last but not least, new vaccines and treatments are needed, which in turn require in-depth understanding of cellular surfaces, protein folding, and myriad nano-bio aspects of host-pathogen interactions. Much attention is being devoted to countering weapons-of-mass-destruction terrorism, since Al-Qaeda and other terrorist groups have repeatedly stated their intention to acquire and use nuclear, chemical, or biological weapons. However, terrorists in Iraq and elsewhere continue to wreak havoc using improvised explosive devices. Thus, there is a pressing security need for better methods for detecting explosive materials and devices. Transformational S&T such as pulsed fast-neutron analysis or terahertz spectroscopy for material- and element-specific imaging offer the promise of greatly improved explosive detection. For bioscience-based approaches, the development of highly multiplexed transducer arrays and molecular recognition methods that mimic biological systems would similarly provide the foundation for vastly improved capabilities. Likewise, new materials an

  1. Critical issues in process control system security : DHS spares project.

    SciTech Connect (OSTI)

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  2. Reimbursable Work for the Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-17

    The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security. Admin Chg 2, dated 6-30-14, supersedes DOE O 484.1 Admin Chg 1. Certified 1-15-15

  3. Reimbursable Work for the Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-17

    The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security. Cancels DOE N 481.1 and DOE N 251.62. Admin Chg 1, dated 3-14-11.

  4. Germanium detectors in homeland security at PNNL

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Stave, S.

    2015-05-01

    Neutron and gamma-ray detection is used for non-proliferation and national security applications. While lower energy resolution detectors such as NaI(Tl) have their place, high purity germanium (HPGe) also has a role to play. A detection with HPGe is often a characterization due to the very high energy resolution. However, HPGe crystals remain small and expensive leaving arrays of smaller crystals as an excellent solution. PNNL has developed two similar HPGe arrays for two very different applications. One array, the Multisensor Aerial Radiation Survey (MARS) detector is a fieldable array that has been tested on trucks, boats, and helicopters. The CASCADESmore »HPGe array is an array designed to assay samples in a low background environment. The history of HPGe arrays at PNNL and the development of MARS and CASCADES will be detailed in this paper along with some of the other applications of HPGe at PNNL.« less

  5. Homeland Security Science, Technology, Engineering, Mathematics Career Development Program Report

    SciTech Connect (OSTI)

    Bryson, Kathleen H.

    2009-11-06

    Report including the background, reserach and recommendations to expand the current DHS HS-STEM Career Development Program.

  6. Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism after September 11

    E-Print Network [OSTI]

    Stowsky, Jay; Kroenig, Matthew

    2005-01-01

    Inspector General of the Homeland Security Department, and BearingPoint, a consulting firm hired by TSA. The reports

  7. Overview of accelerators with potential use in homeland security

    SciTech Connect (OSTI)

    Garnett, Robert W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also be discussed.

  8. Overview of accelerators with potential use in homeland security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Garnett, Robert W.

    2015-01-01

    Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also bemore »discussed.« less

  9. Incorporating Sustainability into Lease and Build Agreements; U.S. Department of Homeland Security (DHS)

    SciTech Connect (OSTI)

    2015-05-26

    This fact sheet discusses the benefits of incorporating sustainability into lease and build agreements.

  10. Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  11. Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

  12. Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security

    E-Print Network [OSTI]

    Requirements [R4] NIST Handbook 150-23, NVLAP Radiation Detection Instruments 3. Compliance Level InformationTesting and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T Radiation Detectors for Homeland Security EFF. DATE 2013-05-17 REV. 3.00 PAGE 1 of 5 Testing and Evaluation

  13. Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security Applications

    E-Print Network [OSTI]

    Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security Applications, Programmer Computational Economics Group January 29, 2010 SAND2010-4315 #12;2 This page intentionally blank #12;3 Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security

  14. Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security 1. Scope with the following documents: [R1] ANSI N42.33, "American National Standard for Portable Radiation Detection

  15. Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland..........................................................................................................3 #12;TEST AND EVALUATION PROTOCOL TEP NO. N42.35 PREPARED BY: DIV682 TITLE: Radiation Detection and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security 1. Scope

  16. Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.

    SciTech Connect (OSTI)

    Koker, Denise; Micheau, Jill M.

    2006-07-01

    This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

  17. Homeland Security Challenges Facing Small Water Systems in Texas 

    E-Print Network [OSTI]

    Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

    2007-05-31

    threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA published the Water Security Action Plan, which outlines research needs to help water...

  18. Homeland Security Presidential Directive HSPD-7 (December 17, 2003) |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergy A plug-inPPLforLDRD Report11,SecurityHome solar systems can save you energy

  19. Northwest Regional Technology Center, January 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Northwest Regional Technology Center, January 2014 Page 1 of 2 Around The Region In Homeland Security January 2014 The Northwest Regional Technology Center (NWRTC) is a virtual resource center resolutions to seek out growth opportunities both personally and professionally. Conveniently the Disaster

  20. Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID: IS24 Page 1

    E-Print Network [OSTI]

    Hayat, Majeed M.

    Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID: IS24 Spectrometer; Feature Selection Abstract The potential use of nanotechnology for hyperspectral (HS article Wiley Handbook of Science and Technology for Homeland Security Article ID: IS24 Page 2

  1. Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security

    SciTech Connect (OSTI)

    Robert Hayes

    2008-04-18

    It is shown in this work that basic measurements made from well defined source detector configurations can be readily converted in to benchmark quality results by which Monte Carlo N-Particle (MCNP) input stacks can be validated. Specifically, a recent measurement made in support of national security at the Nevada Test Site (NTS) is described with sufficient detail to be submitted to the American Nuclear Society’s (ANS) Joint Benchmark Committee (JBC) for consideration as a radiation measurement benchmark. From this very basic measurement, MCNP input stacks are generated and validated both in predicted signal amplitude and spectral shape. Not modeled at this time are those perturbations from the more recent pulse height light (PHL) tally feature, although what spectral deviations are seen can be largely attributed to not including this small correction. The value of this work is as a proof-of-concept demonstration that with well documented historical testing can be converted into formal radiation measurement benchmarks. This effort would support virtual testing of algorithms and new detector configurations.

  2. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect (OSTI)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  3. Status Summary of 3He and Neutron Detection Alternatives for Homeland Security

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Ely, James H.

    2010-04-28

    This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

  4. ARCHITECTURE AND ALGORITHM FOR HIGH PERFORMANCE FAULT-TOLERANT REPLICATION OF SENSITIVE MILITARY AND HOMELAND SECURITY C3I DATABASE

    E-Print Network [OSTI]

    Guturu, Parthasarathy

    AND HOMELAND SECURITY C3I DATABASE MESSAGES Parthasarathy Guturut Electrical Engineering Department, University ofNorth Texas, Denton, TX 76203-0470 ABSTRACT Replicated databases are used by Military and Homeland. In this paper, we propose a rep- licated database nodal architecture in which nodes are organized into multiple

  5. High-Resolution Laser-Induced Breakdown Spectroscopy used in Homeland Security and Forensic Applications

    SciTech Connect (OSTI)

    Martin, Madhavi Z; Wullschleger, Stan D; Vass, Arpad Alexander; Martin, Rodger Carl; Grissino-Mayer, Henri

    2006-01-01

    The technique of laser-induced breakdown spectroscopy (LIBS) to detect elements for a variety of homeland security applications such as nuclear materials identification and inventory,and forensic applications has been demonstrated. For nuclear materials applications, we detected and profiled metals in coatings that were used to encapsulate nuclear fuel. Multivariate analysis has been successfully employed in the quantification of elements present in treated wood and engineered wood composites. These examples demonstrate that LIBS-based techniques are inherently well suited for diverse environmental applications related to homeland security. Three key advantages are evident: (1) small samples (mg) are sufficient; (2) samples can be analyzed by LIBS very rapidly, and (3) biological materials such as human and animal bones and wood can be analyzed with minimal sample preparation. For forensic applications they have used LIBS to determine differences in animal and human bones. They have also applied this technique in the determination of counterfeit and non-counterfeit currency. They recently applied LIBS in helping to solve a murder case.

  6. The Center for Information Systems Security Studies and

    E-Print Network [OSTI]

    The Center for Information Systems Security Studies and Research (CISR) has created the ISSE) and the Department of Homeland Security (DHS) have designated NPS as a Center of Academic Excellence in Information developments where cyber security is a concern. Information Systems Security Engineering (ISSE) Certificate

  7. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    SciTech Connect (OSTI)

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  8. Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications

    E-Print Network [OSTI]

    Reijonen, Jani

    2006-01-01

    NEUTRON GENERATORS DEVELOPED AT LBNL FOR HOMELAND SECURITYtypes of advanced D-D (neutron energy 2.5 MeV), D-T (14MeV) and T-T (0–9 MeV) neutron generators for wide range of

  9. Northwest Regional Technology Center, November 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Infrastructure First Responder Ebola Protection Cyber Security Awareness Managing a Weapons Program relevant cyber security problems by developing the tools, methods, and technologies that will enable" exhibit for a first-hand look at advancements in cyber security and explosives detection, including PNNL

  10. HomelandHomeland SecuritySecurity

    E-Print Network [OSTI]

    and category: 5: Privileged Information . Department of Energy review required before public release Name............................................................................................................... 3 Energy .......................................................................................................5 Banking and Finance.....

  11. Proposed new accelerator design for homeland security x-ray applicatio...

    Office of Scientific and Technical Information (OSTI)

    in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts of x-rays, suitable for current-mode integrated imaging. In...

  12. dhs | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulationdetonation detection | National Nucleardfreppondhs

  13. Northwest Regional Technology Center, April 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    a venue for information sharing and education about cybersecurity concerns, advancements and resources Office of Electricity Delivery & Energy Reliability · Samara Moore, National Security Staff; Director is National 9-1-1 Education Month, and public organizations are working to educate the community about

  14. Proposed new accelerator design for homeland security x-ray applications

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts ofmore »x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 ?s to 10 ?s. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.« less

  15. Proposed new accelerator design for homeland security x-ray applications

    SciTech Connect (OSTI)

    Clayton, James; Shedlock, Daniel; Langeveld, Willem G.J.; Bharadwaj, Vinod; Nosochkov, Yuri

    2015-01-01

    Two goals for security scanning of cargo and freight are the ability to determine the type of material that is being imaged, and to do so at low radiation dose. One commonly used technique to determine the effective Z of the cargo is dual-energy imaging, i.e. imaging with different x-ray energy spectra. Another technique uses the fact that the transmitted x-ray spectrum itself also depends on the effective Z. Spectroscopy is difficult because the energy of individual x rays needs to be measured in a very high count-rate environment. Typical accelerators for security applications offer large but short bursts of x-rays, suitable for current-mode integrated imaging. In order to perform x-ray spectroscopy, a new accelerator design is desired that has the following features: 1) increased duty factor in order to spread out the arrival of x-rays at the detector array over time; 2) x-ray intensity modulation from one delivered pulse to the next by adjusting the accelerator electron beam instantaneous current so as to deliver adequate signal without saturating the spectroscopic detector; and 3) the capability to direct the (forward peaked) x-ray intensity towards high-attenuation areas in the cargo (“fan-beam-steering”). Current sources are capable of 0.1% duty factor, although usually they are operated at significantly lower duty factors (~0.04%), but duty factors in the range 0.4-1.0% are desired. The higher duty factor can be accomplished, e.g., by moving from 300 pulses per second (pps) to 1000 pps and/or increasing the pulse duration from a typical 4 ?s to 10 ?s. This paper describes initial R&D to examine cost effective modifications that could be performed on a typical accelerator for these purposes, as well as R&D for fan-beam steering.

  16. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  17. Field Deployable Gamma Radiation Detectors for DHS Use

    SciTech Connect (OSTI)

    Sanjoy Mukhopadhyay

    2007-08-31

    Recently, the U.S. Department of Homeland Security (DHS) has integrated all nuclear detection research, development, testing, evaluation, acquisition, and operational support into a single office: the Domestic Nuclear Detection Office (DNDO). The DNDO has specific requirements set for all commercial and government off-the-shelf radiation detection equipment and data acquisition systems. This article would investigate several recent developments in field deployable gamma radiation detectors that are attempting to meet the DNDO specifications. Commercially available, transportable, handheld radio isotope identification devices (RIID) are inadequate for DHS’s requirements in terms of sensitivity, resolution, response time and reach back capability. The leading commercial vendor manufacturing handheld gamma spectrometer in the United States is Thermo Electron Corporation. Thermo Electron’s identiFINDER™, which primarily uses sodium iodide crystals (3.18-cm x 2.54-cm cylinders) as gamma detector, has a Full-Width-at-Half-Maximum energy resolution of 7 percent at 662 keV. Thermo Electron has just recently come up with a reach-back capability patented as RadReachBack™ that enables emergency personnel to obtain real-time technical analysis of radiation samples they find in the field. The current project has the goal to build a prototype handheld gamma spectrometer, equipped with a digital camera and an embedded cell phone to be used as an RIID with higher sensitivity (comparable to that of a 7.62-cm x 7.62-cm sodium iodide crystal at low gamma energy ranging from 30 keV to 3,000 keV), better resolution (< 3.0 percent at 662 keV), faster response time (able to detect the presence of gamma-emitting radio isotopes within 5 seconds of approach), which will make it useful as a field deployable tool. The handheld equipment continuously monitors the ambient gamma radiation and, if it comes across any radiation anomalies with higher than normal gamma gross counts, it sets an alarm condition. When a substantial alarm level is reached, the system auto triggers saving of relevant spectral data and software-triggers the digital camera to take a snapshot. The spectral data including in situ analysis and the imagery data will be packaged in a suitable format and sent to a command post using an imbedded cell phone.

  18. Field Deployable Gamma Radiation Detectors for DHS Use

    SciTech Connect (OSTI)

    Sanjoy Mukhopadhyay

    2007-08-01

    Recently, the Department of Homeland Security (DHS) has integrated all nuclear detection research, development, testing, evaluation, acquisition, and operational support into a single office: the Domestic Nuclear Detection Office (DNDO). The DNDO has specific requirements set for all commercial off-the-shelf and government off-the-shelf radiation detection equipment and data acquisition systems. This article would investigate several recent developments in field deployable gamma radiation detectors that are attempting to meet the DNDO specifications. Commercially available, transportable, handheld radio isotope identification devices (RIID) are inadequate for DHS requirements in terms of sensitivity, resolution, response time, and reach-back capability. The leading commercial vendor manufacturing handheld gamma spectrometer in the United States is Thermo Electron Corporation. Thermo Electron's identiFINDER{trademark}, which primarily uses sodium iodide crystals (3.18 x 2.54cm cylinders) as gamma detectors, has a Full-Width-at-Half-Maximum energy resolution of 7 percent at 662 keV. Thermo Electron has just recently come up with a reach-back capability patented as RadReachBack{trademark} that enables emergency personnel to obtain real-time technical analysis of radiation samples they find in the field. The current project has the goal to build a prototype handheld gamma spectrometer, equipped with a digital camera and an embedded cell phone to be used as an RIID with higher sensitivity, better resolution, and faster response time (able to detect the presence of gamma-emitting radio isotopes within 5 seconds of approach), which will make it useful as a field deployable tool. The handheld equipment continuously monitors the ambient gamma radiation, and, if it comes across any radiation anomalies with higher than normal gamma gross counts, it sets an alarm condition. When a substantial alarm level is reached, the system automatically triggers the saving of relevant spectral data and software-triggers the digital camera to take a snapshot. The spectral data including in situ analysis and the imagery data will be packaged in a suitable format and sent to a command post using an imbedded cell phone.

  19. Mathematical Model Applications to Disease and Homeland ...

    E-Print Network [OSTI]

    Mathematical Model Applications to Disease and Homeland Security The events of ... but have no data or reliable information that would help in the planning or ...

  20. dhs

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46A NAME6/%2A

  1. Department of Homeland Security | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent BondingMeeting | Department| DepartmentWesternEngineers

  2. Homeland Security Presidential Directive 7

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergy HeadquartersFuelB IMSofNewsletterGuidingUpdate Webinar Slides HomeHome Performance7,

  3. Report on Department of Homeland Security Sponsored Research Project at Lawrence Livermore National Laboratory on Preparation for an Improvised Nuclear Device Event

    SciTech Connect (OSTI)

    A., B

    2008-07-31

    Following the events of September 11th, a litany of imaginable horribles was trotted out before an anxious and concerned public. To date, government agencies and academics are still grappling with how to best respond to such catastrophes, and as Senator Lieberman's quote says above, now is the time to plan and prepare for such events. One of the nation's worst fears is that terrorists might detonate an improvised nuclear device (IND) in an American city. With 9/11 serving as the catalyst, the government and many NGOs have invested money into research and development of response capabilities throughout the country. Yet, there is still much to learn about how to best respond to an IND event. My summer 2008 internship at Lawrence Livermore National Laboratory afforded me the opportunity to look in depth at the preparedness process and the research that has been conducted on this issue. While at the laboratory I was tasked to collect, combine, and process research on how cities and the federal government can best prepare for the horrific prospect of an IND event. Specific projects that I was involved with were meeting reports, research reviews, and a full project report. Working directly with Brooke Buddemeier and his support team at the National Atmospheric Release Advisory Center, I was able to witness first hand, preparation for meetings with response planners to inform them of the challenges that an IND event would pose to the affected communities. In addition, I supported the Homeland Security Institute team (HSI), which was looking at IND preparation and preparing a Congressional report. I participated in meetings at which local responders expressed their concerns and contributed valuable information to the response plan. I specialized in the psycho-social aspects of an IND event and served as a technical advisor to some of the research groups. Alongside attending and supporting these meetings, I worked on an independent research project which collected information from across disciplines to outline where the state of knowledge on IND response is. In addition, the report looked at meetings that were held over the summer in various cities. The meetings were attended by both federal responders and local responders. The meetings explored issues regarding IND preparation and how to mitigate the effects of an IND detonation. Looking at the research and current preparation activity the report found that the state of knowledge in responding and communicating is a mixed bag. Some aspects of an IND attack are well understood, some are not, but much is left to synthesize. The effects of an IND would be devastating, yet much can be done to mitigate those effects through education, preparation, and research. A major gap in current knowledge is how to effectively communicate with the public before an attack. Little research on the effectiveness of public education has been done, but it is likely that educating the public about the effects of an IND and how to best protect oneself could save many lives.

  4. The U.S. Department of Energy's Brookhaven National Laboratory P.O. Box 5000, Upton NY 11973 631 344-2345 www.bnl.gov Homeland Security

    E-Print Network [OSTI]

    -sponsored with the Department of Energy's National Nuclear Security Administration (NNSA), the Environmental Measurement Energy, Environment, and National Security Directorate (631) 344-4420, cjc@bnl.gov Port securityThe U.S. Department of Energy's Brookhaven National Laboratory · P.O. Box 5000, Upton NY 11973

  5. Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland

    E-Print Network [OSTI]

    Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Radiation Detection Systems Used for Homeland Security EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 10 Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland Security 1. Scope

  6. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  7. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  8. RESPONSE ROBOTS DHS/NIST Sponsored Evaluation Exercises

    E-Print Network [OSTI]

    RESPONSE ROBOTS DHS/NIST Sponsored Evaluation Exercises RESPONSE ROBOTS DHS/NIST Sponsored Evaluation Exercises 11 Pocket Guide Version 2010.2 Pocket Guide Version 2010.2 #12;22 Certain commercial address responder-defined requirements for robot mobility, manipulation, sensors, energy, communications

  9. DHS/National Operations Center | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a CConversion |National Laser

  10. Reimbursable Work for Department of Homeland Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-04-21

    This revised Notice contains additional information and direction to cognizant DOE contracting officers and other affected Federal and contractor personnel identifying the processes and requirements to ensure the efficient implementation of the MOA. DOE N 251.62, dated 04-21-05, extends this directive until 4-21-06. Cancels DOE N 481.1.

  11. The future of infrastructure security : a workshop held at Sandia National Laboratories.

    SciTech Connect (OSTI)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included ininfrastructure' problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions ofsecure and resilient' infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  12. Chavez Position Paper for DHS Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D BGene NetworkNuclear SecurityChattan ooga Eag le For d Devo

  13. Job Proficiency Work Sample Testing for Critical DHS Jobs and

    E-Print Network [OSTI]

    McShea, Daniel W.

    is an absolute count of the number of drug seizures per evaluation period. DHS's Office of Inspector General (2009) recently released a Drug Control Performance Summary Report that noted CBP's opposition or counterproductive. The report concluded that such performance targets alone may offer an incorrect assessment

  14. Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland

    E-Print Network [OSTI]

    Radiation Detection Instruments 3. Compliance Level Information Instrument under test might meet allTesting and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland and Transportable Radiation Monitors Used for Homeland Security EFF. DATE 2013-05-28 REV. 2.00 PAGE 1 of 5 Testing

  15. Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland

    E-Print Network [OSTI]

    Procedures and General Requirements [R4] NIST Handbook 150-23, NVLAP Radiation Detection Instruments 3Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland Radiation Detectors (SPRDs) for Homeland Security. EFF. DATE 2013-05-30 REV. 2.00 PAGE 1 of 5 Testing

  16. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Environmental Management (EM)

    Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

  17. Homeland 

    E-Print Network [OSTI]

    Casmey, W. H. [author

    2012-03-05

    Little is known about the distribution of black corals in the northwestern Gulf of Mexico. Of thirty-nine species of black coral documented in the Western Atlantic, thirty have been previously documented by various studies in the Gulf of Mexico...

  18. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  19. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  1. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  2. Unmanned and Unattended Response Capability for Homeland Defense

    SciTech Connect (OSTI)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

  3. New TCIPG Research Program Builds on Past Successes with Nearly...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Homeland Security (DHS) will fund the new Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project, an expanded effort of the current project TCIP. The new TCIPG...

  4. National Security Science and Technology Initiative: Air Cargo Screening

    SciTech Connect (OSTI)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive benchmarks combinations, and conducted modeling and simulation studies to begin populating the matrix of commodities, threats, and detection technologies. (4) Designed and fabricated basic (homogeneous) commodity test pallets and fabricated inert stimulants to support experiments and to validate modeling/simulation results. (5) Developed/expanded the team's capabilities to conduct full-scale imaging (neutron and x-ray) experiments of air cargo commodities and explosive benchmarks. (6) Conducted experiments to improve the collection of trace particles of explosives from a variety of surfaces representative of air cargo materials by means of mechanical (air/vibration/pressure), thermal, and electrostatic methods. Air cargo screening is a difficult challenge that will require significant investment in both research and development to find a suitable solution to ensure the safety of passengers without significantly hindering the flow of commodities. The initiative funded by Battelle has positioned this group to make major contributions in meeting the air cargo challenge by developing collaborations, developing laboratory test systems, improving knowledge of the challenges (both technical and business) for air cargo screening, and increasing the understanding of the capabilities for current inspection methods (x-ray radiography, x-ray backscatter, etc.) and potential future inspection methods (neutron radiography, fusion of detector modalities, advanced trace detection, etc.). Lastly, air cargo screening is still an issue that will benefit from collaboration between Department of Energy Laboratories and Battelle. On January 7, 2010, DHS Secretary Napolitano joined White House Press Secretary Robert Gibbs and Assistant to the President for Counterterrorism and Homeland Security John Brennan to announce several recommendations DHS has made to the President for improving the technology and procedures used to protect air travel from acts of terrorism. (This announcement followed the 25 Dec'09 Delta/Northwest Airlines Flight 253 terror attack.) Secretary Napolitano out

  5. Nevada National Security Site-Directed Research and Development FY 2011 Annual Report

    SciTech Connect (OSTI)

    Howard Bender, comp.

    2012-04-25

    This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supporting our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.

  6. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  7. PNNLs Data Intensive Computing research battles Homeland Security threats

    ScienceCinema (OSTI)

    David Thurman; Joe Kielman; Katherine Wolf; David Atkinson

    2012-12-31

    The Pacific Northwest National Laboratorys (PNNL's) approach to data intensive computing (DIC) is focused on three key research areas: hybrid hardware architecture, software architectures, and analytic algorithms. Advancements in these areas will help to address, and solve, DIC issues associated with capturing, managing, analyzing and understanding, in near real time, data at volumes and rates that push the frontiers of current technologies.

  8. Directionally Sensitive Neutron Detector For Homeland Security Applications 

    E-Print Network [OSTI]

    Spence, Grant

    2012-02-14

    KAERI Korean Atomic Energy Research Institute MC Monte Carlo Mathematical Model MCNPX Monte Carlo N- Particle Extended NaI Sodium Iodide PMT Photomultiplier Tube PTRAC Particle Tracing Function of MCNPX PVT Polyvynal Taluene RPMs... tubes, and the flat blue and pink plates in front of the 3He tubes are the PVT detectors. ...................................................................................................... 45 Fig. 23. MCNPX...

  9. Capacities and Research in Homeland Security The University at Buffalo

    E-Print Network [OSTI]

    Krovi, Venkat

    , and Biophotonics (ILPB) and the Center for Spin Effects and Quantum Information in Nanostructures (CSEQuIN) conduct multidisciplinary science and technology programs focusing on the development of: (1) high capacity data storage devices for "smart sensor" systems to detect biological and chemical agents. These research directions

  10. Before Senate Committee on Homeland Security and Governmental...

    Broader source: Energy.gov (indexed) [DOE]

    Operational Plan and Desktop Reference for the Disability Employment Program ITP Mining: Education Roadmap for Mining Professionals (December 2002) Mentoring to Increase...

  11. National Atmospheric Release Advisory Center (NARAC) Capabilities for Homeland Security

    SciTech Connect (OSTI)

    Sugiyama, G; Nasstrom, J; Baskett, R; Simpson, M

    2010-03-08

    The Department of Energy's National Atmospheric Release Advisory Center (NARAC) provides critical information during hazardous airborne releases as part of an integrated national preparedness and response strategy. Located at Lawrence Livermore National Laboratory, NARAC provides 24/7 tools and expert services to map the spread of hazardous material accidentally or intentionally released into the atmosphere. NARAC graphical products show affected areas and populations, potential casualties, and health effect or protective action guideline levels. LLNL experts produce quality-assured analyses based on field data to assist decision makers and responders. NARAC staff and collaborators conduct research and development into new science, tools, capabilities, and technologies in strategically important areas related to airborne transport and fate modeling and emergency response. This paper provides a brief overview of some of NARAC's activities, capabilities, and research and development.

  12. Purdue Homeland Security J. Eric Dietz, PhD, PE

    E-Print Network [OSTI]

    Ginzel, Matthew

    vehicle and Smart Grid · 2012 Indianapolis Super Bowl ­ Developing methods for using social networking evacuation RHRC location and resources #12;Crossroads Smart Grid Training Program ­ $9 million DOE Grant · Partnership with Ivy Tech Community College · Smart Grid connects electricity distribution grid with two

  13. Before the Senate Homeland Security and Governmental Affairs...

    Broader source: Energy.gov (indexed) [DOE]

    Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy Subject: Cutting the Federal Government's Energy Bill: An Examination of...

  14. Passive Neutron Detection in Ports for Homeland Security Applications 

    E-Print Network [OSTI]

    Pedicini, Eowyn E

    2013-05-07

    for the detection of SNM being carried on small, personal watercraft. Previous work examined the possibility of using active neutron detectors to induce fission in SNM and detect the response. This thesis examines the possibility of detecting SNM using passive 3He...

  15. Applications to Homeland Security from the Katrina and Rita Hurricanes 

    E-Print Network [OSTI]

    2006-01-01

    PREDICTORS OF AGGRESSION An Undergraduate Research Scholars Thesis by KATRINA GODBEE Submitted to Honors and Undergraduate Research Texas A&M University in partial fulfillment of the requirements for the designation as an UNDERGRADUATE... ........................................................................................................................... 16 1 ABSTRACT Personality Predictors of Aggression. (May 2015) Katrina Godbee Department of Psychology Texas A&M University Research Advisor: Dr. Arnold LeUnes & Dr. Tony Bourgeois Department of Psychology Texas A&M University...

  16. Indiana Department of Homeland Security - NNPP Exercise | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996How to Apply for an SESIn September 2013,2013

  17. NAMP Participates in Homeland Security Exercise | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOEDepartment of Energy Motion toCITIZENSHarris, with the Oak Ridge

  18. Notices DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOEDepartmentNew JerseyEnergybenefits of6107 / Wednesday, June 4,008

  19. Before Senate Committee on Homeland Security and Governmental Affairs

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUS SERVICE SUBSIDIESDepartmentandEnergySubcommittee on

  20. Before the Senate Homeland Security and Governmental Affairs Subcommittee

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUSEnergy CyberDepartment of EnergyInfrastructure

  1. Before the Senate Homeland Security and Governmental Affairs Subcommittee

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De p uBUSEnergy CyberDepartment of EnergyInfrastructureon

  2. Homeland Security and Emergency Management Coordination (HSEMC) Program |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive Holiday FoodPages default

  3. How ORISE is Making a Difference: Homeland Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation CurrentHenry Bellamy, Ph.D.Food Drive HolidayHours UsedFire

  4. Homeland Security | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighland Viewdefault SignEnergy ScoreHome andof

  5. ORISE: California Homeland Security Exercise and Evaluation Program (HSEEP)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEY UNIVERSE The 2014 surveyNuclearHowAsseton

  6. Before the Senate Homeland Security and Governmental Affairs Subcommittee

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsofProgram:Y-12Power, Inc |Bartlesville EnergyDepartmenton Contracting Oversight |

  7. Homeland, California: Energy Resources | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy Resources JumpNew Jersey: EnergyHollyHoma Hills,Homeland, California: Energy

  8. NNSA takes part in 'DHS Day on the Hill' | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session | Nationalhits 21 percent

  9. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  10. Return to the Homeland: Travels in Nigeria by Ola Washington

    E-Print Network [OSTI]

    Amankulor, J. Ndukaku

    1989-01-01

    of America during her visit to Nigeria. The imponant thingshowed that she went to Nigeria having a positive attitudethe Homeland; Travels in Nigeria - No Snakes, No Monkeys, No

  11. Oak Ridge National Laboratory National Security Programs

    E-Print Network [OSTI]

    Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies and Homeland Security #12;OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY Nuclear Nonproliferation $27,050 Cleanup $7,481 Science $359M National Security $278M Energy $170M Cleanup $0.8M Total $1.08B

  12. DHS | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding Low-Cost Ground8 GasDEVELOPMENT OF THE HELICAL

  13. Secure Information Sharing and Dissemination in the Context of Public Security

    E-Print Network [OSTI]

    Secure Information Sharing and Dissemination in the Context of Public Security Professor Nabil R. Adam Director, The Center for Information Management Integration & Connectivity (CIMIC) Executive://cimic.rutgers.edu/~adam/ Abstract In the context of homeland security, one of the key challenges in such environment is achieving

  14. DHS National Technical Nuclear Forensics Program FY 10 Summary Report: Graduate Mentoring Assistance Program (GMAP)

    SciTech Connect (OSTI)

    Martha R. Finck Ph.D.

    2011-10-01

    This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. The summary report details the student/mentor experience and future plans after the first summer practicum. This program provides practical training to DHS graduate fellows in the DOE laboratory complex. It involves coordinating students, their thesis advisors, and their laboratory project mentors in establishing a meaningful program of research which contributes to the graduate student's formation as a member of the nuclear forensics community. This final written report includes information concerning the overall mentoring experience, including benefits (to the lab, the mentors, and the students), challenges, student research contributions, and lab mentor interactions with students home universities. Idaho National Laboratory hosted two DHS Nuclear Forensics graduate Fellows (nuclear engineering) in summer 2011. Two more Fellows (radiochemistry) are expected to conduct research at the INL under this program starting in 2012. An undergraduate Fellow (nuclear engineering) who worked in summer 2011 at the laboratory is keenly interested in applying for the NF Graduate Fellowship this winter with the aim of returning to INL. In summary, this program appears to have great potential for success in supporting graduate level students who pursue careers in nuclear forensics. This relatively specialized field may not have been an obvious choice for some who have already shown talent in the traditional areas of chemistry or nuclear engineering. The active recruiting for this scholarship program for candidates at universities across the U.S. brings needed visibility to this field. Not only does this program offer critical practical training to these students, it brings attention to a very attractive field of work where young professionals are urgently required in order for the future. The effectiveness of retaining such talent remains to be seen and may be primarily controlled by the availability of DOE laboratory research funding in this field in the years to come.

  15. Lawrence Livermore National Laboratory / Energy Security and

    E-Print Network [OSTI]

    Blake Natural Gas Infrastructure, Bill Pickles S2TAR GEN IV, AAA, and AFCI, Bill Halsey GeothermalLawrence Livermore National Laboratory / Energy Security and Technology Program Jeffrey Stewart is to provide research in the areas of national and homeland security and other important areas to DOE

  16. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    SciTech Connect (OSTI)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  17. August 2012 CIP Report Focuses on Smart Grid Security

    Broader source: Energy.gov [DOE]

    The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience.

  18. NIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4,

    E-Print Network [OSTI]

    , the Intelligence Community, the Committee on National Security Systems, the Department of Homeland Security, and UNIST Computer Security Division csrc.nist.gov Summary of NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations Kelley Dempsey Computer Security

  19. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  20. The National Center for Biomedical Research and Training (NCBRT) at Louisiana State University invites you to join us for a unique training opportunity. The NCBRT is offering the following Department of

    E-Print Network [OSTI]

    Harms, Kyle E.

    invites you to join us for a unique training opportunity. The NCBRT is offering the following Department State University offers DHS-certified courses covered under the NCBRT's Homeland Security NationalTraining Program CooperativeAgreement. As a DHS primary training provider, the NCBRT can offer this vital training

  1. Northwest Regional Technology Center, August 2011 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    active ports. For example, next-generation infrared cameras can work in high- humidity environments like-cost sensors, is simple, quick, and ad hoc. It can identify collapse precursors and display a threat level and development project at PNNL, in conjunction with QinetiQ North America, is identifying and evaluating areas

  2. Northwest Regional Technology Center, June 2013 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Radiological Nuclear Detection (PRND) initiatives. The purposes of the event were to provide information about capabilities and approaches to investigate suspect radiological/nuclear threats, to understand potential a workshop at Seattle's Joint Training Facility to better understand first responder biodetection

  3. Northwest Regional Technology Center, July 2014 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    important is the future of technical innovation in helping to detect, deter and prevent acts of terror? Jay innovation is so important. We have a few items that always top our list that would make us more effective of the biodetection products, discuss the PNNL Biodetection Technologies Product Guide, and provided a forum

  4. U.S. Department of Homeland Security Student and Exchange Visitor Program

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Minnesota http://www.dps.state.mn.us/dvs/index.html Mississippi http://www://publicsafety.utah.gov/dld/ Vermont http://www.aot.state.vt.us/dmv/dmvhp.htm Virginia http://www.dmv.state.va.us/ Washington http://www.dol.wa.gov/ Washington, DC http://dmv.dc.gov/main.shtm West Virginia http://www.wvdot.com/6_MOTORISTS/DMV/6g1_licenses

  5. FEMA Fiscal Year (FY) 2015 Tribal Homeland Security Grant Program (THSGP) Notice of Funding Opportunity (NOFO)

    Broader source: Energy.gov [DOE]

    The FY 2015 THSGP supports the building, sustainment and delivery of core capabilities to enable Tribes to strengthen their capacity to prevent, protect against, mitigate, respond to, and recover from potential terrorist attacks and other hazards.

  6. Northwest Regional Technology Center, February 2011 Page 1 of 2 Around The Region In Homeland Security

    E-Print Network [OSTI]

    Association, will conduct the Sixth Annual Fundamentals of Grants Management Workshop for grantees currently, is designed to enhance grantees' ability to administer FEMA grant funding. Suggested attendees include current grantees, direct recipients of FEMA funding, subrecipients of FEMA funding, and individuals with limited

  7. Proposed New Accelerator Design for Homeland Security X-Ray Applicatio...

    Office of Scientific and Technical Information (OSTI)

    Bibtex Format Close 0 pages in this document matching the terms "" Search For Terms: Enter terms in the toolbar above to search the full text of this document for pages...

  8. ORISE: U.S. Department of Homeland Security Summer Research Team Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shinesSolarNewsusceptometer underIRossybelle Perales ResearchRaquel

  9. ORISE: U.S. Department of Homeland Security is seeking faculty, graduate

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxideUser WorkEP PowerresourcesScientific

  10. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTech ConnectSpeeding accessusers'(x≤2)Article)SciTechon MPASReport) | SciTechReport)

  11. Proposed New Accelerator Design for Homeland Security X-Ray Applications

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTech ConnectSpeeding accessusers'(x≤2)Article)SciTechon MPASReport) |

  12. Department of Homeland Security, Science and Technology Directorate, Borders and Maritime Security Division: Renewable Energy Research Roadmap

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent BondingMeeting | Department| DepartmentWesternEngineersNREL is a

  13. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  14. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  15. R&D for Better Nuclear Security: Radiation Detector Materials

    SciTech Connect (OSTI)

    Kammeraad, J E

    2009-04-02

    I am going to talk about the need for better materials for radiation detectors. I believe that government investment in this area can enable transformational technology change that could impact domestic nuclear security and also national nuclear security in some very positive and powerful ways. I'm not going to give you a lecture on how radiation detectors work, but I am going to tell you a bit about today's off-the-shelf technology and why it is not sufficient, what we need, and what security benefit you could get from improvements. I think we're at a critical point in time for some very impactful investments. In particular I'm going to focus on the use of gamma-ray radiation detectors at ports of entry. Not long before DHS was formed, Congress decreed that counter measures against the delivery of radiological and nuclear threats would be put in place at US ports of entry, under the authority of US Customs (later Customs and Border Protection in DHS). This included the screening of all cars and trucks passing through a port of entry. Existing off-the-shelf radiation detectors had to be selected for this purpose. Plans were made to make the most of the available technologies, but there are some inherent limitations of these detectors, plus the operational setting can bring out other limitations.

  16. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  17. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  18. Today, there are almost 90 federal agencies that are rapidly upgrad-ing and enhancing their language resources. For national security, the

    E-Print Network [OSTI]

    Hill, Wendell T.

    their language resources. For national security, the globalization of business, and a better understanding lives are at stake on foreign soil, or we think about homeland security, then increasing the nation's foreign language capacity is a vital national security priority." At the University of Maryland, new

  19. DHS Letter ??? MERRTT Approval

    Office of Environmental Management (EM)

    Technical Assistance Division has asked me to respond to your letter and above cited curriculum submission of January 31, 2005. The course submitted has been reviewed and accepted...

  20. DHS Written Report

    SciTech Connect (OSTI)

    Palomares, Javier [Los Alamos National Laboratory

    2012-08-31

    Recently, a new galactic cosmic-ray (GCR) source option [1] was implemented in the all-energy, all-particle transport code MCNP6 [2]. In this paper, we made use of this feature to calculate surface neutron and photon background fluxes on a terrestrial grid around the earth. These spectra have been incorporated into Release 2 of the 'background.dat' file, which is read and sampled by MCNP6 whenever a user invokes the background source option [2]. Cosmic radiation bombards Earth with various particles, such as protons and {alpha} particles, some of which are deflected by the Earth's shielding magnetic field. Particles that carry sufficient energy can overcome the deflection and penetrate into the atmosphere. The sufficient energy is dependent on the terrestrial coordinates due to the magnetic force's proportionality to the sine of the angle between the velocity vector of the incoming particle and the magnetic field. As the particles propagate through the atmosphere, collisions with atmospheric molecules generate new particles such as neutrons, protons, photons, muons, pions, and other exotic particles. These secondary often have sufficient energy to undergo additional nuclear interactions, and so on, forming what is known as a cascade shower. The tabulation of background particle fluxes on the surface of the earth is important for a variety of reasons, one of which is the design of nuclear material detection systems. The simulations used various models and formulations for the cosmic source spectra, atmosphere, and terrestrial conditions to correctly model the propagation of GCR particles through the atmosphere to surface level.

  1. DHS SSP Template

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergyEveryCustomerD= DOE/RG-0067u.s.The Department of

  2. DHS1028.PDF

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergyEveryCustomerD= DOE/RG-0067u.s.The Department

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  6. National Security Technology Incubator Business Plan

    SciTech Connect (OSTI)

    None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  7. Homeland Security Exercise and Evaluation Program (HSEEP) Public Announcement, Dartmouth Emergency Medical Services NNE Collegiate Drill Day

    E-Print Network [OSTI]

    Bucci, David J.

    Medical Services NNE Collegiate Drill Day Dartmouth EMS Collegiate Day Drill, 2013 PUBLIC ANNOUNCEMENT's medical response to a crisis situation. The exercise will involve a fictional medical and trauma drill and

  8. Testimony before a Joint Meeting of the Senate Finance Committee and the Senate Transportation and Homeland Security Committee

    E-Print Network [OSTI]

    potentially important historical lessons. When we experienced a rapid run-up in the price of oil in the late 70s and early 1980s corresponding once again to a rapid increase in the price of oil which caused, projected fuel efficiencies, their impact on fuel tax revenues, and construction commodity prices. I will do

  9. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  11. Annual Report on the Activities and Publications of the DHS-DNDO-NTNFC-Sponsored Post-doctoral Fellow at Los Alamos National Laboratory

    SciTech Connect (OSTI)

    Coleman, Magen E.; Tandon, Lav

    2012-04-24

    This report is a summary update on the projects Magen Coleman is working on as a postdoctoral fellow funded by DHS. These research projects are designed to explore different radioanalytical facets of nuclear forensics, including destructive and non-destructive analysis, chronometry measurements and modeling, spectral analysis, and actinide separations. Method development and instrumental analysis are integral parts of these projects, along with strong radiochemical knowledge. The current projects discussed here include method development for {sup 232}U analysis, the assembly of a gamma mapping system, the testing of neutron bubble detectors for neutron spectrometry, and continued work on the chronometry of plutonium and uranium materials. This report documents the work that has been performed since April 2011.

  12. A Report on the Activities, Publications, and Pending Research of DHS/DOD Sponsored Post-doctoral Research Associate at Los Alamos National Laboratory

    SciTech Connect (OSTI)

    Stanley, Floyd E.; Tandon, Lav

    2012-04-26

    Since beginning at Los Alamos National Laboratory in February of 2012, I have been working as a DHS./DNDO Postdoctoral Research Associate under the mentorship of Lav Tandon and Khalil Spencer (NA-22 and mass spectrometry). The focus of my efforts, in addition to pursuing needed training and qualifications, has been the application of various instrumental approaches (e.g. Thermal Ionization Mass Spectrometry; TIMS) to a range of systems of interest in materials characterization and nuclear forensics. Research to be pursued in the coming months shall include the continued use of such approaches to advance current methods for: modified total evaporation, monitoring critical minor isotope systems, and chronometry. Each of the above points will be discussed.

  13. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  14. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  15. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  16. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  17. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  18. A comparison of Mexico's Border Industry Program with the Border Industry Program of South Africa and its Bantu homelands 

    E-Print Network [OSTI]

    Notzon, Brian Anthony

    1973-01-01

    A COMPARISON OF MEXICO'S BORDER INDUSTRY PROGRAM WITH THE BORDER INDUSTRY PROGRAM OF SOUTH AFRICA AND ITS BANTU HOMELANDS A Thesis by BRIAN ANTHONY NOTZON Submitted to the Graduate College of Texas ASM University in partial fulfillment... of the requirement for the degree of MASTER OF SCIENCE May 1973 Ma)or Sub)ect: Economics A COMPARISON OP MEXICO'S BORDER INDUSTRY PROGRAM WITH THE BORDER INDUSTRY PROGRAM OF SOUTH AFRICA AND ITS BANTU HOMELANDS A Thesis by BRIAN ANTHONY NOTZON Approved...

  19. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  3. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  4. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  5. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  6. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  7. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  15. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  16. Report for Development of a Census Array and Evaluation of the Array to Detect Biothreat Agents and Environmental Samples for DHS

    SciTech Connect (OSTI)

    Jaing, C; Jackson, P

    2011-04-14

    The objective of this project is to provide DHS a comprehensive evaluation of the current genomic technologies including genotyping, Taqman PCR, multiple locus variable tandem repeat analysis (MLVA), microarray and high-throughput DNA sequencing in the analysis of biothreat agents from complex environmental samples. This report focuses on the design, testing and results of samples on the Census Array. We designed a Census/Detection Array to detect all sequenced viruses (including phage), bacteria (eubacteria), and plasmids. Family-specific probes were selected for all sequenced viral and bacterial complete genomes, segments, and plasmids. Probes were designed to tolerate some sequence variation to enable detection of divergent species with homology to sequenced organisms, and to be unique relative to the human genome. A combination of 'detection' probes with high levels of conservation within a family plus 'census' probes targeting strain/isolate specific regions enabled detection and taxonomic classification from the level of family down to the strain. The array has wider coverage of bacterial and viral targets based on more recent sequence data and more probes per target than other microbial detection/discovery arrays in the literature. We tested the array with purified bacterial and viral DNA/RNA samples, artificial mixes of known bacterial/viral samples, spiked DNA against complex background including BW aerosol samples and soil samples, and environmental samples to evaluate the array's sensitivity and forensic capability. The data were analyzed using our novel maximum likelihood software. For most of the organisms tested, we have achieved at least species level discrimination.

  17. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  18. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  20. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  3. The US/Global Achilles heel : economic terrorism.

    SciTech Connect (OSTI)

    Backus, George A.

    2005-04-01

    While loss of life is the operating concern of Department of Homeland Security (DHS), the security of the economy ultimately decides the success of the war on terrorism. This project focuses on mitigation, containment, response, and impact of terrorist events on the economy. Conventional economic methods are inadequate, but agent-based methods (Discrete Simulation) appears to uniquely capture the dynamics and emergent (human) behaviors.

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  6. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  7. DHS Summer Student Project Report

    SciTech Connect (OSTI)

    Kawamoto, S

    2005-08-19

    Tetanus and botulinum neurotoxins are among the most potent toxins known to man (Montecucco et al. al., 1995). Produced by the Clostridium tetani and Clostridium botulinum bacteria, respectively, these toxins concentrate in presynaptic axons and inhibit the release of neurotransmitters leading to paralysis and possibly death. Due to the potency of this lethal class of neurotoxins, we have undertaken a project to develop high affinity ligands that specifically bind to these toxins. Such compounds can have significant implications in both the design of detection systems to monitor for the possible release of these neurotoxins into the public and also the design of possible therapeutics to treat individuals exposed to tetanus or botulinum neurotoxins. The Clostridial neurotoxins are synthesized as 150 kDa proteins that are post-translationally cleaved into N- and C-terminal fragments held together by a single disulfide bond. The tetanus C-terminal fragment (TetC) has been shown to bind specifically to gangliosides present on the neuronal membrane surface and facilitate endocytosis of the toxin (Morris et al., 1980). Once the toxin is internalized in a membrane-bound vesicle, the light chain (N-terminal fragment) translocates to the cytosol where it interferes with neurotransmitter release. Previous work has demonstrated that various small molecule and peptide-based compounds bind to TetC, albeit in different locations. Among these molecules are the anticancer agent doxorubicin (Dox) and the tripeptides WEY and YEW (Figure 1; Cosman et al. al., 2002). The crystal structure of botulinum toxin and Dox (PDB code: 1I1E) demonstrates that Dox binds in a surface groove of in C-terminal fragment that is conserved in both botulinum and tetanus toxins. Similarly, YEW has been shown to bind to a second binding site that is highly conserved and also relatively close to the binding site of Dox. Thus, in our quest to design and synthesize high affinity ligands, we proposed to link Dox and YEW (or WEY) in hopes of creating a bidentate ligand. In theory, such a ligand could have a binding affinity approaching the product of the two binding affinities of the individual ligands. For my internship project, I was charged with the task of creating libraries of compounds linking Dox and YEW (or WEY) with linkers of varying lengths (Figure 2a). In addition, I was to attach a fluorescein dye to the molecules (Figure 2b) so that they could be used to develop a fluorescence polarization (FP) binding assay. The FP assay will greatly increase the ease with which future ligands can be rapidly screened and binding affinities can be accurately determined. As a side project, I worked on optimizing the conditions necessary to employ the Huisgen 1,3-dipolar cycloaddition reaction to be able to optimize linker lengths and possibly compound solubility (Huisgen, 1984). This reaction, often termed ''click chemistry'', utilizes molecules terminally functionalized with either an acetylene moiety or an azide. In the presence of a copper(I) catalyst, the alkyne and azide undergo a step-wise cycloaddition reaction to link the two molecules together via the formation of a 1,4-disubstituted triazole ring (Figure 3; Rostovtsev et al., 2002). By varying the length of the tethers between the terminal acetylene or azide and their respective molecules, the overall length of the linker between the two molecules can be ''fine tuned'' by one carbon unit at a time. At the completion of my internship I had synthesized conjugates of Doxorubicin and N-acyl-WEY linked together by linkers having 0-2 polyethylene glycol (PEG) linkers. These compounds are currently being used in experiments that employ electrospray ionization mass spectrometry (ESI-MS) to determine whether they bind to TetC with higher affinity than either Dox or WEY alone. I also synthesized the fluorescein tagged versions of the same three molecules. It is expected that these molecules will be used in the near future to develop a fluorescence polarization-based competitive binding assay for TetC and possibly botuli

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  10. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  11. Engage States on Energy Assurance and Energy Security

    SciTech Connect (OSTI)

    Kara Colton; John Ratliff; Sue Gander; Darren Springer; Greg Dierkers

    2008-09-30

    The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short and long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  13. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  14. National Security Technologies VPP 2012

    Energy Savers [EERE]

    for other Federal Agencies, such as the Defense Threat Reduction Agency, National Aeronautics and Space Administration, Nuclear Regulatory Commission, Department of Homeland...

  15. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  16. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  17. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  18. U.S. Coast Guard and Florida Power & Light Successfully Implement a Multi-Site UESC Project

    SciTech Connect (OSTI)

    2013-05-01

    As the largest component of the Department of Homeland Security (DHS), more than 42,000 active-duty members of the U.S. Coast Guard safeguard the nation’s maritime interests. Consequently, Coast Guard facilities represent about 60 percent of the DHS shore energy use portfolio. Under the National Energy Conservation Policy Act (NECPA) and Executive Order 13423, the Coast Guard has reduced its facility energy intensity year-on-year, achieving a fiscal year (FY) 2012 reduction of 28.6 percent from a FY 2003 baseline.

  19. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  20. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  1. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  2. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  3. Day, night and all-weather security surveillance automation synergy from combining two powerful technologies

    SciTech Connect (OSTI)

    Morellas, Vassilios; Johnson, Andrew [Honeywell Labs, 3660, Technology Drive, Minneapolis MN 5518 (United States); Johnston, Chris [Honeywell ACS, 1985 Douglas Drive North, Golden Valley MN 55422 (United States); Roberts, Sharon D.; Francisco, Glen L. [L-3 Communications Infrared Products, 13532 N. Central Expressway, Dallas TX 75243 (United States)

    2006-07-01

    Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

  4. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  5. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  7. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  8. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  9. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  10. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  11. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  12. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  13. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  14. Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia

    Broader source: Energy.gov [DOE]

    Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management

  15. Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider

    E-Print Network [OSTI]

    Friedman, Peter S; Chapman, J Wehrley; Levin, Daniel S; Weaverdyck, Curtis; Zhou, Bing; Benhammou, Yan; Etzion, Erez; Moshe, M Ben; Silver, Yiftah; Beene, James R; Varner, Robert L

    2010-01-01

    A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

  16. Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider

    E-Print Network [OSTI]

    Peter S. Friedman; Robert Ball; J. Wehrley Chapman; Daniel S. Levin; Curtis Weaverdyck; Bing Zhou; Yan Benhammou; Erez Etzion; M. Ben Moshe; Yiftah Silver; James R. Beene; Robert L. Varner Jr.

    2010-07-03

    A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

  17. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  20. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  1. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  2. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  3. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  4. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  5. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  6. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  7. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  8. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  9. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  10. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  11. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  12. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  13. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  14. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  15. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  16. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  17. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  18. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  19. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  20. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  1. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  2. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  3. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  4. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  5. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  7. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  8. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  9. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  10. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  11. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  12. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  13. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  14. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  16. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  17. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  18. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  20. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  1. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  3. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  4. Los Alamos Shows Airport Security Technology at Work

    ScienceCinema (OSTI)

    Espy, Michelle; Schultz, Larry; Hunter, James

    2014-06-24

    Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

  5. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  6. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  7. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  8. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  9. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  10. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  11. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  12. Risk assessment methodology applied to counter IED research & development portfolio prioritization

    SciTech Connect (OSTI)

    Shevitz, Daniel W; O' Brien, David A; Zerkle, David K; Key, Brian P; Chavez, Gregory M

    2009-01-01

    In an effort to protect the United States from the ever increasing threat of domestic terrorism, the Department of Homeland Security, Science and Technology Directorate (DHS S&T), has significantly increased research activities to counter the terrorist use of explosives. More over, DHS S&T has established a robust Counter-Improvised Explosive Device (C-IED) Program to Deter, Predict, Detect, Defeat, and Mitigate this imminent threat to the Homeland. The DHS S&T portfolio is complicated and changing. In order to provide the ''best answer'' for the available resources, DHS S&T would like some ''risk based'' process for making funding decisions. There is a definite need for a methodology to compare very different types of technologies on a common basis. A methodology was developed that allows users to evaluate a new ''quad chart'' and rank it, compared to all other quad charts across S&T divisions. It couples a logic model with an evidential reasoning model using an Excel spreadsheet containing weights of the subjective merits of different technologies. The methodology produces an Excel spreadsheet containing the aggregate rankings of the different technologies. It uses Extensible Logic Modeling (ELM) for logic models combined with LANL software called INFTree for evidential reasoning.

  13. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  14. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  18. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  19. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  20. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  1. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  2. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  3. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  4. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  7. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  8. Microsoft PowerPoint - 5_SCOTT_SLAVENS_Power Point PSA presentation...

    National Nuclear Security Administration (NNSA)

    Homeland Security Investigations SSA Greg Slavens CPIC Colorado Springs Counter-Proliferation Investigations 2 Homeland Security Investigations HSI Jurisdictional Authorities ...

  9. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  10. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  11. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  12. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  13. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  14. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  15. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  16. Rationale and Development of a Security Assurance Index with Application toward the Development of a World Risk Index

    SciTech Connect (OSTI)

    M. M. Plum; G. A. Beitel, PhD

    2006-06-01

    Assurance categories were previously developed to support the Department of Homeland Security’s efforts in the mitigation of Cyber Control System events. Defined according to the risk of life and economic loss, the minimum range is designated by policy, whereas the maximum limit seems to be constrained only by limits and interdependencies of the event. Use of this life / assets scale has proven to be helpful in managing risk due to the scale's ease of use, communication, and understanding. Suggestions have been made that this scale could be applied to all events of terror, disaster, and calamity of an international scale, with equally good results. This paper presents the history of some existing scales of disaster and assurance, the rationale behind the development of the original Security Assurance Index, and our proposed scale of disaster and calamity as a World Risk Index.

  17. Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  18. Reassessing Residential Design in Hawaii: Design Construction Building Analysis and Publishing Design Guidelines for a Passive-Design Model Home on Hawaiian Homeland 

    E-Print Network [OSTI]

    Meder, S.

    2006-01-01

    , University of Hawaii Sea Grant College Program Hawaii University of Hawaii School of Architecture ABSTRACT Hawaii is more reliant on fossil fuel for its electrical generation than any other state in the nation. Hawaii has the highest... Hawaii’s homes comfortable. This paper will describe a project where the State Department of Hawaii Homelands, the University of Hawaii School of Architecture, the Committee on the Environment for the Honolulu Chapter of American Institute...

  19. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  20. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  1. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  3. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  4. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  5. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  6. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  7. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  8. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  9. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  10. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  11. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  12. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  13. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  14. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  15. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  16. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  17. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  18. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  19. DHS Flat Stanley Project | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p aDepartmentEnergyEveryCustomerD= DOE/RG-0067u.s.The Department of

  20. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  1. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  2. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  3. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  4. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  5. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  6. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  7. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  8. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  9. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  10. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  11. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  14. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  16. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  17. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  18. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  19. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  1. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  2. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  4. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  5. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  6. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  7. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  8. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  9. Gray, W. D. (2003). Cognitive factors in homeland defense: The role of human factors in the novel intelligence from massive data (NIMD) project, Human Factors and Ergonomics Society (pp. 1017-1018). Santa Monica, CA: Human

    E-Print Network [OSTI]

    Gray, Wayne

    2003-01-01

    intelligence from massive data (NIMD) project, Human Factors and Ergonomics Society (pp. 1017-1018). Santa Monica, CA: Human Factors and Ergonomics Society. COGNITIVE FACTORS IN HOMELAND DEFENSE: THE ROLE

  10. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  11. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  12. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  13. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  14. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  15. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  16. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  17. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  18. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  19. Idaho National Laboratory Small Business Program Vision & Opportunity

    E-Print Network [OSTI]

    contributor in national and homeland security, alternate and renewable energy and science and technology Studies Nuclear Programs Energy Security Global Security Homeland Security National Defense A leader in critical infrastructure protection for security of energy supply and delivery National & Homeland

  20. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  1. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  2. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  3. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  4. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  5. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  6. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  9. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  10. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  11. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  12. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  13. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  14. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  15. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  16. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  17. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  18. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  19. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  20. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  1. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  2. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  8. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  9. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  10. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  11. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  12. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  14. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  17. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  18. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  19. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  3. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  4. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  5. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  6. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  7. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  8. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  9. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  10. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  11. Computer Security Division 2009 Annual Report

    E-Print Network [OSTI]

    Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

  12. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y. (Rochester, MN)

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  13. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01

    system engineer. A tool is developed to support the steps supporting this methodology and help to bridge the smart metering domain. Copyright © 2013 John Wiley & Sons, Ltd. KEYWORDS model-based engineering; security engineering; security ontology; domain-specific modelling; embedded systems; smart metering

  14. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  15. PRACTICAL SECURITY Implementing Security Education at a Small Community College

    E-Print Network [OSTI]

    Whatcom Community College Abstract: This paper discusses modifying an existing two-year degree to include, and introducing an information security specialty into an existing degree can be challenging. At Whatcom Community ASSURANCE CURRICULUM At the beginning of the 2003-2004 academic year, Whatcom had one security course

  16. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  17. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  19. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  20. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

  1. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  2. GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl

    E-Print Network [OSTI]

    Dodis, Yevgeniy

    GM-Security and Semantic Security Revisited Yevgeniy Dodis Matthias Ruhl MIT Laboratory give a simple proof that GM-security and semantic security are equivalent security no- tions for public security definitions which are still the mostly used ones today. The two notions are called `GM

  3. Concept of Operations for Real-time Airborne Management System

    SciTech Connect (OSTI)

    Barr, Jonathan L.; Taira, Randal Y.; Orr, Heather M.

    2013-03-04

    The purpose of this document is to describe the operating concepts, capabilities, and benefits of RAMS including descriptions of how the system implementations can improve emergency response, damage assessment, task prioritization, and situation awareness. This CONOPS provides general information on operational processes and procedures required to utilize RAMS, and expected performance benefits of the system. The primary audiences for this document are the end users of RAMS (including flight operators and incident commanders) and the RAMS management team. Other audiences include interested offices within the Department of Homeland Security (DHS), and officials from other state and local jurisdictions who want to implement similar systems.

  4. Nonproportionality of Scintillator Detectors: Theory and Experiment

    E-Print Network [OSTI]

    Moses, William

    2010-01-01

    part by the National Nuclear Security Administration, Officeof Homeland Security, Domestic Nuclear Detection Office and

  5. Coaxial Mono-Energetic Gamma Generator for Active Interrogation

    E-Print Network [OSTI]

    Ludewigt, Bernhard A.

    2010-01-01

    of Energy's National Nuclear Security Administration underof Homeland Security, Domestic Nuclear Detection Office

  6. Requirements Definition for ORNL Trusted Corridors Project

    SciTech Connect (OSTI)

    Walker, Randy M [ORNL; Hill, David E [ORNL; Smith, Cyrus M [ORNL; DeNap, Frank A [ORNL; White, James D [ORNL; Gross, Ian G [ORNL; Gorman, Bryan L [ORNL; Hively, Lee M [ORNL; Abercrombie, Robert K [ORNL

    2008-02-01

    The ORNL Trusted Corridors Project has several other names: SensorNet Transportation Pilot; Identification and Monitoring of Radiation (in commerce) Shipments (IMR(ic)S); and Southeastern Transportation Corridor Pilot (SETCP). The project involves acquisition and analysis of transportation data at two mobile and three fixed inspection stations in five states (Kentucky, Mississippi, South Carolina, Tennessee, and Washington DC). Collaborators include the State Police organizations that are responsible for highway safety, law enforcement, and incident response. The three states with fixed weigh-station deployments (KY, SC, TN) are interested in coordination of this effort for highway safety, law enforcement, and sorting/targeting/interdiction of potentially non-compliant vehicles/persons/cargo. The Domestic Nuclear Detection Office (DNDO) in the U.S. Department of Homeland Security (DHS) is interested in these deployments, as a Pilot test (SETCP) to identify Improvised Nuclear Devices (INDs) in highway transport. However, the level of DNDO integration among these state deployments is presently uncertain. Moreover, DHS issues are considered secondary by the states, which perceive this work as an opportunity to leverage these (new) dual-use technologies for state needs. In addition, present experience shows that radiation detectors alone cannot detect DHS-identified IND threats. Continued SETCP success depends on the level of integration of current state/local police operations with the new DHS task of detecting IND threats, in addition to emergency preparedness and homeland security. This document describes the enabling components for continued SETCP development and success, including: sensors and their use at existing deployments (Section 1); personnel training (Section 2); concept of operations (Section 3); knowledge discovery from the copious data (Section 4); smart data collection, integration and database development, advanced algorithms for multiple sensors, and network communications (Section 5); and harmonization of local, state, and Federal procedures and protocols (Section 6).

  7. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  8. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  9. Trusted Cloud: Microsoft Azure Security, Privacy,

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance April 2015 #12;Trusted Cloud................................................................. 18 #12;Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance | April, 2015 Introduction: Microsoft Azure Security, Privacy, and Compliance | April, 2015 #12;3 Contents Introduction

  10. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01

    plants as a form of energy security in the absence of suffi-can be drawn. The energy security situation and outlook areregional cooperation on energy and security issues in Asia.

  11. POLICYProfessional Perspectives on Energy Security, Economics,

    E-Print Network [OSTI]

    TheGoalsof ENERGY POLICYProfessional Perspectives on Energy Security, Economics Security, Economics, and the Environment The Goals of Energy Policy: Professional Perspectives on Energy Security, Economics, and the Environment EXECUTIVE SUMMARY Energy-related incidents and issues ­ the BP

  12. Security Design and Information Aggregation in Markets

    E-Print Network [OSTI]

    Chen, Yiling

    Security Design and Information Aggregation in Markets Yiling Chen Anthony M. Kwasnica Abstract that information aggregation ability of markets is affected by the security design. Behavior of individual Keywords: Security design; Information aggregation; Information market; Price convergence. 1 Introduction

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat’,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  14. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    myths and facts behind cyber security risks for industrialJ. and Hieb, J. [2007], ‘Cyber security risk assessment forOn Cyber Security for Networked Control Systems by Saurabh

  15. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    is directed to develop cyber security standards, guidelines, and associated methods and techniques. ITLNISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew

  16. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  17. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    Radack, Editor Computer Security Division Information Technology Laboratory National Institute-35, Guide to Information Technology Security Ser vices, Recommendations of the National InstituteJune 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley

  18. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  19. Water Scarcity, Security and democracy

    E-Print Network [OSTI]

    Water Scarcity, Security and democracy: a Mediterranean Mosaic edited by Francesca de châtel, Gail holst-WarhaFt and taMMo steenhuis #12;#12;Water Scarcity, Security and democracy: a mediterranean moSaic #12;© 2014 by Global Water Partnership Mediterranean, Cornell University and the Atkinson Center

  20. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  1. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  2. Distributed Internet Security and Measurement

    E-Print Network [OSTI]

    New Mexico, University of

    , New Mexico May, 2009 #12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science for the Degree of Doctor of Philosophy Computer Science The University of New Mexico Albuquerque, New Mexico May

  3. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  4. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  6. (No) Security in Automation!?

    E-Print Network [OSTI]

    Lüders, S

    2008-01-01

    Modern Information Technologies like Ethernet, TCP/IP, web server or FTP are nowadays increas-ingly used in distributed control and automation systems. Thus, information from the factory floor is now directly available at the management level (From Shop-Floor to Top-Floor) and can be ma-nipulated from there. Despite the benefits coming with this (r)evolution, new vulnerabilities are in-herited, too: worms and viruses spread within seconds via Ethernet and attackers are becoming interested in control systems. Unfortunately, control systems lack the standard security features that usual office PCs have. This contribution will elaborate on these problems, discuss the vulnerabilities of modern control systems and present international initiatives for mitigation.

  7. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01

    impacts and responses to environmental change making it anhuman security or environmental change if the lecturer isReview: Global Environmental Change and Human Security By

  8. Developing Secure Power Systems Professional Competence: Alignment...

    Energy Savers [EERE]

    Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (JulyAugust 2013) Developing Secure Power Systems...

  9. Transportation Safeguards & Security Test Bed (TSSTB) | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Safeguards and Security Test Bed May 30, 2013 The Transportation Safeguards and Security Test Bed consists of a test-bed vehicle and a monitoringlaboratorytraining...

  10. Control Systems Security Standards: Accomplishments And Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    that need to be made toward meeting the priority strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards:...

  11. Energy Security Planning for Sustainable Buildings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    capabilities are sufficient to serve their most critical needs during a prolonged outage. Energy Security Assessments For analysis and planning, see Performing Energy Security...

  12. Lemnos Interoperable Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements,...

  13. Recommended Security Controls for Federal Information Systems...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines (Derived From Appendix F) Minimum Requirements: FedRamp Security Controls...

  14. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Office of Environmental Management (EM)

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  15. Nuclear Security Conference 2010 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his...

  16. 2014 Headquarters Facilities Master Security Plan- Acronyms

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Acronyms A list of the acronyms contained in the 2014 Headquarters Facilities Master Security Plan (HQFMSP).

  17. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  18. Nevada National Security Site Waste Acceptance Criteria

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office Environmental...

  19. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  20. Enforcement Letter, National Security Technologies, LLC - November...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 13, 2007 Enforcement Letter, National Security Technologies, LLC - November 13, 2007 November 13, 2007 Issued to National Security Technologies, LLC related to an...

  1. Consent Order, Lawrence Livermore National National Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lawrence Livermore National National Security, LLC - WCO-2010-01 Consent Order, Lawrence Livermore National National Security, LLC - WCO-2010-01 October 29, 2010 Issued to Lawrence...

  2. Voluntary Protection Program Onsite Review, National Security...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - February 2015 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - February 2015 February 2015 Recertification of...

  3. Independent Activity Report, Nevada National Security Site -...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    December 2012 Independent Activity Report, Nevada National Security Site - December 2012 December 2012 Nevada National Security Site Operational Awareness Visit HIAR...

  4. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security Enforcement Preliminary Notice of Violation...

  5. Voluntary Protection Program Onsite Review, National Security...

    Energy Savers [EERE]

    January 2009 Voluntary Protection Program Onsite Review, National Security Technologies, LLC - January 2009 January 2009 Evaluation to determine whether the National Security...

  6. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat...

  7. National Nuclear Security Administration Appropriation and Program...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

  8. National Nuclear Security Administration Fact Sheet Preliminary...

    Energy Savers [EERE]

    Worker Safety and Health Violations at Nevada National Security Site On August 25, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of...

  9. Control Systems Security Publications Library | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Metrics for Process Control Systems - September 2007 Security Framework for Control System Data Classification and Protection - July 2007 Secure ICCP Integration...

  10. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  11. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    is caused due to an error within the delay feature and can be exploited to consume all web server instances via multiple failed login attempts. IMPACT: Drupal Login Security...

  12. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a...

  13. Sandia National Laboratories: National Security Missions: International

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployee &andHomeland andHomeland and

  14. Sandia National Laboratories: National Security Missions: International

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygenLaboratoryInnovationEmployee &andHomeland andHomeland

  15. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  16. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  17. Meeting Federal Energy Security Requirements

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation—given at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

  18. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  19. Intrusion detection using secure signatures

    DOE Patents [OSTI]

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  20. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  1. INL@Work Cyber Security

    SciTech Connect (OSTI)

    Chaffin, May

    2010-01-01

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  2. INL@Work Cyber Security

    ScienceCinema (OSTI)

    Chaffin, May

    2013-05-28

    May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

  3. Java Programming MSc. Internet Security

    E-Print Network [OSTI]

    Hill, Gary

    Java Programming MSc. Internet Security - 1 - Table of content Introduction Appendices............................................................................. 70 #12;Java and accompanying application using Java 3D coding. The developed application, in a Java 3D environment, will form

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threatand the Threat of Climate Change,” The CNA Corporation, 2007

  5. Master Safeguards and Security Agreements

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03

    To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

  6. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

  7. Security Area Vouching and Piggybacking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-06-05

    Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

  8. OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    OFFICE OF INFORMATION TECHNOLOGY COMPUTER SECURITY POLICY RESPONsmLE ADMINISTRATOR: RESPONsm Manual, Chapter 14: Data and Information Security, Section 4, Information Security Plans ­ Physical%20-%20DATA%20AND%20INFORMATION%20SECURITY.pdf. CONTACTS Refer to the Office of Information Technology

  9. Terms of Reference Information Security Group

    E-Print Network [OSTI]

    Haase, Markus

    Terms of Reference Information Security Group Version 3.1 8 March 2011 © University of Leeds 2011 Security Group Information Security Management 3.1 (8/3/11) Page 2 of 4 Document Control Owner: Kevin Darley, IT Security Co-ordinator, Information Systems Services, University of Leeds Source Location: V

  10. Finance, IT Operations & Information Security Dear Colleagues,

    E-Print Network [OSTI]

    1 Finance, IT Operations & Information Security Dear Colleagues, It is hard not to be mindful financial institutions or e-commerce organizations. On December 6, SEAS' Information Security Office held some basic security awareness information. More information on how to remain secure during the busy

  11. University of Aberdeen Information Security Policy

    E-Print Network [OSTI]

    Levi, Ran

    University of Aberdeen Information Security Policy December 2007 #12;1 INTRODUCTION 1.1 WHAT IS INFORMATION SECURITY AND WHY DO WE NEED TO THINK ABOUT IT? 1.1.1 Information Security is the practice of Information Security includes: Systems being unavailable Bad publicity and embarrassment Fraud

  12. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  13. 7: Network Security Comp 361, Fall 2003

    E-Print Network [OSTI]

    Golin, Mordecai J.

    "securely" Trudy (intruder) may intercept, delete, add messages secure sender secure receiver channel Alice, Alice be? ... well, real-life Bobs and Alices! Web browser/server for electronic transactions (e updates other examples? #12;7: Network Security 6 Comp 361, Fall 2003 There are bad guys (and girls) out

  14. A Graphical Approach to Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    A Graphical Approach to Security Risk Analysis Doctoral Dissertation by Ida Hogganvik Submitted to security risk analysis i Acknowledgements First of all, I would like to thank my supervisor Ketil Střlen to security risk analysis #12;A graphical approach to security risk analysis iii List of Original Publications

  15. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    operate in Ř transport mode · end-to-end Ř tunnel mode · security-gateway to security-gateway v transport Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi Sandhu 2001 IP TUNNELING Source mode and tunnel model can coexist #12;7© Ravi Sandhu 2001 IP TUNNELING C A B D Public Internet Internal

  16. Internet Security Protocols Lectures 7 and 8

    E-Print Network [OSTI]

    Sandhu, Ravi

    PROTOCOLS both IP AH and IP ESP can operate in transport mode · end-to-end tunnel mode · security-gateway to security-gateway transport mode and tunnel model can coexist #12;7© Ravi Sandhu 2000-2004 IP TUNNELING C A B D Public Internet Internal Network 2 Internal Network 1 Security Gateway Security Gateway 8© Ravi

  17. Are We Compromised? Modelling Security Assessment Games

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    against cyber-attacks. A security assessment is the process of determining how effectively an entity being examples of cyber attacks that fit this profile are the security breach at RSA Data Security [6Are We Compromised? Modelling Security Assessment Games Viet Pham and Carlos Cid Information

  18. Cyber Security Research: A Personal Perspective

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed It will be messy but need not be chaotic! Cyber security research and practice are loosing ground © Ravi Sandhu 2 with Real-World Impact! Cyber Security Scope #12; What is fundamental to cyber security? Where

  19. Cyber Security Basic Defenses and Attack Trends

    E-Print Network [OSTI]

    Sastry, S. Shankar

    37 38 39 40 41 4273 MTC 4 Cyber Security Basic Defenses and Attack Trends Alvaro A. Cárdenas, Tanya for a successful defense. Cyber security is the branch of security dealing with digital or information technology.1 This chapter presents a selected overview on topics in cyber security. 1. Throughout the chapter, we use

  20. Computer Security Division 2008 Annual Report

    E-Print Network [OSTI]

    played an active role in implementation planning for the Comprehensive National Cyber Security InitiativeComputer Security Division 2008 Annual Report #12;TAble of ConTenTS Welcome 1 Division Organization 2 The Computer Security Division Responds to the Federal Information Security Management Act