Powered by Deep Web Technologies
Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

2

Homeland Security Presidential Directive 7  

Broader source: Energy.gov (indexed) [DOE]

3 Homeland Security Presidential Directive/Hspd-7 3 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization, and Protection Purpose (1) This directive establishes a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks. Background (2) Terrorists seek to destroy, incapacitate, or exploit critical infrastructure and key resources across the United States to threaten national security, cause mass casualties, weaken our economy, and damage public morale and confidence. (3) America's open and technologically complex society includes a wide array of critical infrastructure

3

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department and sampling, explosive detection, microfluidics and labs-on-a-chip, chem- ical plume dispersal in urban security combines established fluids topics like plume dispersion with others that are new

Settles, Gary S.

4

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

5

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

6

Homeland Security | U.S. DOE Office of Science (SC)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

7

Before the Senate Homeland Security and Governmental Affairs...  

Broader source: Energy.gov (indexed) [DOE]

Homeland Security and Governmental Affairs Subcommittee on Contracting Oversight Before the Senate Homeland Security and Governmental Affairs Subcommittee on Contracting Oversight...

8

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Broader source: Energy.gov (indexed) [DOE]

Senate Homeland Security and Governmental Affairs Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen

9

Homeland Security and Emergency Management Coordination (HSEMC) Program |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security and Emergency Management Coordination (HSEMC) Program | Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Homeland Security and Emergency Management Coordination (HSEMC) Program Home > About Us > Our Programs > Emergency Response > Planning for Emergencies > Homeland Security and Emergency Management Coordination

10

Reimbursable Work for the Department of Homeland Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security.

2006-08-17T23:59:59.000Z

11

How ORISE is Making a Difference: Homeland Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security of the nation. Result: ORISE has assisted in the coordination of: Merit review of letters of intent, white papers, proposals for the university-based Homeland...

12

Muon Fluence Measurements for Homeland Security Applications  

SciTech Connect (OSTI)

This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

2010-08-10T23:59:59.000Z

13

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Broader source: Energy.gov (indexed) [DOE]

Homeland Security and Governmental Affairs Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia Before the Senate Homeland Security and Governmental Affairs Subcommittee on Oversight of Government Management, the Workforce, and the District of Columbia By: John Bashista, Deputy Director, Office of Procurement and Assistance Management, Office of Management Subject: Strengthening the Federal Acquisition Workforce: Government-wide Leadership and Initiatives 8-5-09_Final_Testimony_(Bashista).pdf More Documents & Publications Special Report: IG-RA-09-02 Before Senate Committee on Homeland Security and Governmental Affairs

14

Before the Senate Homeland Security and Governmental Affairs Subcommittee  

Broader source: Energy.gov (indexed) [DOE]

Services, and International Security Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security By: Edward R. Simpson, Director, Office of Procurement and Assistance Management, Office of Management Subject: Cost-Plus Award Fee 8-3-09_Final_Testimony_(Simpson).pdf More Documents & Publications Major Management Challenges and Program Risks : Department of Energy GAO/OCG-99-6 GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects

15

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network [OSTI]

with small water systems to develop volun- tary assessments of the homeland security threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA...

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

16

Science and Technology Challenges for Homeland Security  

SciTech Connect (OSTI)

Preventing and protecting against catastrophic terrorism is a complex and dynamic challenge. Small groups or individuals can use advanced technology to cause massive destruction, and the rapid pace of technology and ease of information dissemination continually gives terrorists new tools. A 100% defense is not possible. It's a numbers problem--there are simply too many possible targets to protect and too many potential attack scenarios and adversaries to defend against. However, science and technology (S&T) is a powerful force multiplier for defense. We must use S&T to get ahead of the game by making terrorist attacks more difficult to execute, more likely to be interdicted, and less devastating in terms of casualties, economic damage, or lasting disruption. Several S&T areas have potential to significantly enhance homeland security efforts with regard to detecting radiation, pathogens, explosives, and chemical signatures of weapons activities. All of these areas require interdisciplinary research and development (R&D), and many critically depend on advances in materials science. For example, the science of nuclear signatures lies at the core of efforts to develop enhanced radiation detection and nuclear attribution capabilities. Current radiation detectors require cryogenic cooling and are too bulky and expensive. Novel signatures of nuclear decay, new detector materials that provide high resolution at ambient temperatures, and new imaging detectors are needed. Such technologies will improve our ability to detect and locate small, distant, or moving sources and to discriminate threat materials from legitimate sources. A more complete understanding of isotopic ratios via secondary ion mass spectrometry (SIMS), NanoSIMS, or yet-to-be-developed technologies is required to elucidate critical characteristics of nuclear materials (e.g., isotopics, age, reprocessing) in order to identify their source and route history. S&T challenges abound in the biodefense arena as well. Improved biodetectors are needed--autonomous instruments that continuously monitor the environment for threat pathogens, promptly alert authorities in the event of a positive detection, and have an extremely low false alarm rate. Because many threat pathogens are endemic to various regions of the world, the natural microbial environment must be characterized so that background detections can be distinguished from a deliberate release. In addition, most current detection approaches require an a priori knowledge of the pathogens of concern and thus won't work in the face of a new, naturally occurring disease, such as a mutated avian influenza that effects humans, or a deliberately manipulated organism. Thus, we must move from species-specific detection to function-based detection based on a fundamental understanding of the mechanisms and genetic markers of infectivity, pathogenicity, antibiotic resistance, and other traits that distinguish a harmful organism from an innocuous one. Last but not least, new vaccines and treatments are needed, which in turn require in-depth understanding of cellular surfaces, protein folding, and myriad nano-bio aspects of host-pathogen interactions. Much attention is being devoted to countering weapons-of-mass-destruction terrorism, since Al-Qaeda and other terrorist groups have repeatedly stated their intention to acquire and use nuclear, chemical, or biological weapons. However, terrorists in Iraq and elsewhere continue to wreak havoc using improvised explosive devices. Thus, there is a pressing security need for better methods for detecting explosive materials and devices. Transformational S&T such as pulsed fast-neutron analysis or terahertz spectroscopy for material- and element-specific imaging offer the promise of greatly improved explosive detection. For bioscience-based approaches, the development of highly multiplexed transducer arrays and molecular recognition methods that mimic biological systems would similarly provide the foundation for vastly improved capabilities. Likewise, new materials an

Murray, C A

2006-03-24T23:59:59.000Z

17

ORISE: California Homeland Security Exercise and Evaluation Program (HSEEP)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

California Homeland Security Exercise and Evaluation Program (HSEEP) California Homeland Security Exercise and Evaluation Program (HSEEP) Training The Oak Ridge Institute for Science and Education (ORISE) and the California Governor's Office of Emergency Services) have revised the next generation Homeland Security Exercise and Evaluation Program (HSEEP) course to create a balance between learning exercise methodology and using Web-based toolkit activities to plan and develop exercises. The revised HSEEP training course is a four-day, interactive course with computer-based activities that maximize use of the HSEEP Toolkit. The course is focused on hands-on, toolkit activities that provide participants with valuable practice and training. The course also allows participants to use their own jurisdictional information to complete course activities,

18

The Department of Homeland Security Energy Management Program  

Broader source: Energy.gov (indexed) [DOE]

Homeland Security Homeland Security Energy Management Program May 2, 2007 DHS Energy Program Overview Steven W. White, CEM May 2, 2007 2 Policy "It is the policy of the United States that Federal agencies conduct their environmental, transportation, and energy- related activities under the law in support of their respective missions in an environmentally, economically and fiscally sound, integrated, continuously improving, efficient, and sustainable manner." (Executive Order 13423, Section 1 - Policy) DHS Energy Program Overview Steven W. White, CEM May 2, 2007 3 Program Foundation  Comply with requirements of Laws, Regulations and Executive

19

Reimbursable Work for the Department of Homeland Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security. Admin Chg 2, dated 6-30-14, cancels DOE O 484.1 Admin Chg 1.

2006-08-17T23:59:59.000Z

20

Reimbursable Work for the Department of Homeland Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes DOE policies and procedures for the acceptance, performance, and administration of reimbursable work directly funded by the Department of Homeland Security. Cancels DOE N 481.1 and DOE N 251.62. Admin Chg 1, dated 3-14-11.

2006-08-17T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

FACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project  

E-Print Network [OSTI]

FACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project US Department Liberty International Airport. US Department of Homeland Security - - Office of Intelligence and Analysis Project US Army - - Tank and Automotive Research, Development and Engineering Center Mobile Computing

22

Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Handheld Radionuclide Identifiers for Use in Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

23

Testing and Evaluation Protocol for Spectroscopy-Based Portal Monitors Used for Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopy- Based Portal Monitors Used for Homeland Security................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

24

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Alarming Personal Radiation Detectors for Homeland Security T................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

25

Before the House Subcommittee on Counterterrorism and Intelligence- Committee on Homeland Security  

Broader source: Energy.gov [DOE]

Subject: Implications of Refinery Closures for U.S. Homeland Security and Critical Infrastructure Safety By: Howard Gruenspecht, Acting Administrator of the Energy Information Administration

26

Captain Debora R. Barr, NOAA Director, NOAA Homeland Security Program Office  

E-Print Network [OSTI]

as the Acting Deputy Director, National Environmental Satellite and Information Service (NESDIS) OfficeCaptain Debora R. Barr, NOAA Director, NOAA Homeland Security Program Office Captain (CAPT) Debora R. Barr is the Director of NOAA's Homeland Security Program Office. She is responsible

27

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

28

Industrial and Grid Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

29

Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID: XXXX Page 17  

E-Print Network [OSTI]

of any distributed computing system (DCS) is to offer a flexible, reliable and powerful computingTechnical article Wiley Handbook of Science and Technology for Homeland Security Article ID: XXXX when operated or deployed in harsh or threat-prone environments. For instance, in WSNs deployed

Hayat, Majeed M.

30

Purdue Homeland Security J. Eric Dietz, PhD, PE  

E-Print Network [OSTI]

planning and training for Indiana, Illinois and Wisconsin · Energy Security Workforce Development · Partnership with Ivy Tech Community College · Smart Grid connects electricity distribution grid with two and control, planning, biological detection, sensors, forensics, communications, robotics and infrastructure

Ginzel, Matthew

31

Status Summary of 3He and Neutron Detection Alternatives for Homeland Security  

SciTech Connect (OSTI)

This is a short summary whitepaper on results of our alternatives work: Neutron detection is an important aspect of interdiction of radiological threats for homeland security purposes since plutonium, a material used for nuclear weapons, is a significant source of fission neutrons [Kouzes 2005]. Because of the imminent shortage of 3He, which is used in the most commonly deployed neutron detectors, a replacement technology for neutron detection is required for most detection systems in the very near future [Kouzes 2009a]. For homeland security applications, neutron false alarms from a detector can result in significant impact. This puts a strong requirement on any neutron detection technology not to generate false neutron counts in the presence of a large gamma ray-only source [Kouzes et al. 2008].

Kouzes, Richard T.; Ely, James H.

2010-04-28T23:59:59.000Z

32

Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID:CS29 Page 1  

E-Print Network [OSTI]

Technical article Wiley Handbook of Science and Technology for Homeland Security Article ID:CS29 Network, RFID, Embedded, Security, Privacy Abstract As embedded computer systems continue to explode and the design constraints posed by these systems that make security difficult. We summarize current research

Stankovic, John A.

33

Deputy Assistant Secretary Matt Moury's Written Testimony Before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Government Affairs (March 11, 2014)  

Broader source: Energy.gov [DOE]

Written statement of Deputy Assistant Secretary Matt Moury's Written Testimony Before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Government Affairs...

34

Improving the nuclear data base for non-proliferation and homeland security  

SciTech Connect (OSTI)

Many of the technical advances in non-proliferation and homeland security require calculations of transport of neutrons and gamma-rays through materials. The nuclear data base on which these calculations are made must be of high quality in order for the calculated responses to be credible. At the Los Alamos Neutron Science Center, three spallation neutron sources are being used to provide high-quality cross section and structure data with reactions induced by neutrons. Neutron transmission, neutron-induced fission and capture cross sections, neutron emission in fission, and gamma-ray production by neutrons are principal areas of research. Furthermore, these sources are also being used to validate calculations of the characterization and response of new detectors and detection techniques. Current research activities are summarized here.

Haight, Robert C [Los Alamos National Laboratory; Bitteker, Leo J [Los Alamos National Laboratory; Couture, Aaron J [Los Alamos National Laboratory; Devlin, Matthew J [Los Alamos National Laboratory; Fotiadis, Nikolaos [Los Alamos National Laboratory; Gavron, Avigdor [Los Alamos National Laboratory; Hill, Tony S [Los Alamos National Laboratory; Laptev, Alexander B [Los Alamos National Laboratory; Nelson, Ronald O [Los Alamos National Laboratory; O'donnell, John M [Los Alamos National Laboratory; Taddeucci, Terry N [Los Alamos National Laboratory; Tovesson, Fredrik K [Los Alamos National Laboratory; Ulmann, John L [Los Alamos National Laboratory; Wender, Stephen A [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

35

Neutron Generators Developed at LBNL for Homeland Security andImaging Applications  

SciTech Connect (OSTI)

The Plasma and Ion Source Technology Group at Lawrence Berkeley National Laboratory has developed various types of advanced D-D (neutron energy 2.5 MeV), D-T (14 MeV) and T-T (0-9 MeV) neutron generators for wide range of applications. These applications include medical (Boron Neutron Capture Therapy), homeland security (Prompt Gamma Activation Analysis, Fast Neutron Activation Analysis and Pulsed Fast Neutron Transmission Spectroscopy) and planetary exploration with a sub-surface material characterization on Mars. These neutron generators utilize RF induction discharge to ionize the deuterium/tritium gas. This discharge method provides high plasma density for high output current, high atomic species from molecular gases, long life operation and versatility for various discharge chamber geometries. Four main neutron generator developments are discussed here: high neutron output co-axial neutron generator for BNCT applications, point neutron generator for security applications, compact and sub-compact axial neutron generator for elemental analysis applications. Current status of the neutron generator development with experimental data will be presented.

Reijonen, Jani

2006-08-13T23:59:59.000Z

36

Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Portable Radiation Detection Instrumentation for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

37

Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland Security  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Radiation Detection Portal Monitors for Use in Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

38

Current state of commercial radiation detection equipment for homeland security applications.  

SciTech Connect (OSTI)

With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors.

Klann, R. T.; Shergur, J.; Mattesich, G.; Nuclear Engineering Division; DHS

2009-10-01T23:59:59.000Z

39

Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications  

E-Print Network [OSTI]

NEUTRON GENERATORS DEVELOPED AT LBNL FOR HOMELAND SECURITYMeV) and T-T (09 MeV) neutron generators for wide range ofon Mars. These neutron generators utilize RF induction

Reijonen, Jani

2006-01-01T23:59:59.000Z

40

Neutron Generators Developed at LBNL for Homeland Security and Imaging Applications  

E-Print Network [OSTI]

NEUTRON GENERATORS DEVELOPED AT LBNL FOR HOMELAND SECURITYtypes of advanced D-D (neutron energy 2.5 MeV), D-T (14MeV) and T-T (09 MeV) neutron generators for wide range of

Reijonen, Jani

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

42

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

43

HSARPA seeking video software technology to interpret complex surveillance Homeland Security 04/21/2004  

E-Print Network [OSTI]

are due by July 12. HSARPA will make its selections and begin contract negotiations by Aug. 30. The day that feed into typical operations centers make viewer fatigue and distraction "a major problem," Davis said. Security personnel now often monitor as many as 20 different cameras. But Davis and other researchers

Davis, James W.

44

Citizens' social media use and homeland security information policy: Some evidences from Twitter users during the 2013 North Korea nuclear test  

Science Journals Connector (OSTI)

Abstract In the era of Web 2.0, managing risk communication on social networking sites has increasingly become crucial and complicated issues in the field of homeland security. The response to the 2013 nuclear test in North Korea was largely based on a coordinated effort by Korea's Ministry of Defense, the United Nations, and many countries from around the globe. By analyzing risk communication networks emerged from Twitter users for the period from January 30 to February 24, 2013, this study investigates the way in which citizens' risk communication is formulated through social media and how they transmit risk information in homeland security. Analysis results show the dynamic evolution of risk communication networks based on influential actors with critical information who played pivotal roles in distributing this information to other actors.

Kyujin Jung; Han Woo Park

2014-01-01T23:59:59.000Z

45

DOE and Industry Showcase New Control Systems Security Technologies...  

Broader source: Energy.gov (indexed) [DOE]

Technology Development Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at...

46

SAMPLING AND MASS SPECTROMETRY APPROACHES FOR THE DETECTION OF DRUGS AND FOREIGN CONTAMINANTS IN BREATH FOR HOMELAND SECURITY APPLICATIONS  

SciTech Connect (OSTI)

Homeland security relies heavily on analytical chemistry to identify suspicious materials and persons. Traditionally this role has focused on attribution, determining the type and origin of an explosive, for example. But as technology advances, analytical chemistry can and will play an important role in the prevention and preemption of terrorist attacks. More sensitive and selective detection techniques can allow suspicious materials and persons to be identified even before a final destructive product is made. The work presented herein focuses on the use of commercial and novel detection techniques for application to the prevention of terrorist activities. Although drugs are not commonly thought of when discussing terrorism, narcoterrorism has become a significant threat in the 21st century. The role of the drug trade in the funding of terrorist groups is prevalent; thus, reducing the trafficking of illegal drugs can play a role in the prevention of terrorism by cutting off much needed funding. To do so, sensitive, specific, and robust analytical equipment is needed to quickly identify a suspected drug sample no matter what matrix it is in. Single Particle Aerosol Mass Spectrometry (SPAMS) is a novel technique that has previously been applied to biological and chemical detection. The current work applies SPAMS to drug analysis, identifying the active ingredients in single component, multi-component, and multi-tablet drug samples in a relatively non-destructive manner. In order to do so, a sampling apparatus was created to allow particle generation from drug tablets with on-line introduction to the SPAMS instrument. Rules trees were developed to automate the identification of drug samples on a single particle basis. A novel analytical scheme was also developed to identify suspect individuals based on chemical signatures in human breath. Human breath was sampled using an RTube{trademark} and the trace volatile organic compounds (VOCs) were preconcentrated using solid phase microextraction (SPME) and identified using gas chromatography - mass spectrometry (GC-MS). Modifications to the sampling apparatus allowed for increased VOC collection efficiency, and reduced the time of sampling and analysis by over 25%. The VOCs are present in breath due to either endogenous production, or exposure to an external source through absorption, inhalation, or ingestion. Detection of these exogenous chemicals can provide information on the prior location and activities of the subject. Breath samples collected before and after exposure in a hardware store and nail salon were analyzed to investigate the prior location of a subject; breath samples collected before and after oral exposure to terpenes and terpenoid compounds, pseudoephedrine, and inhalation exposure to hexamine and other explosive related compounds were analyzed to investigate the prior activity of a subject. The elimination of such compounds from the body was also monitored. In application, this technique may provide an early warning system to identify persons of interest in the prevention and preemption stages of homeland security.

Martin, A N

2009-01-27T23:59:59.000Z

47

Homeland Security Presidential Directive  

E-Print Network [OSTI]

to whom WFMO has made: (a) a tentative job offer of employment; (b) an entry on duty date (EOD) has been established; (c) the selectee will require the issuance of a PIV Credential upon EOD. 1.3 Timelines is required to obtain pre-appointment approval prior to the EOD of the selectee. WFMO reviews all suitability

48

Assessing homeland chemical hazards outside the military gates: industrial hazard threat assessments for department of defense installations  

Science Journals Connector (OSTI)

As part of comprehensive joint medical surveillance measures outlined by the Department of Defense, the US Army Center for Health Promotion and Preventive Medicine (USACHPPM) is beginning to assess environmental health threats to continental US military installations. A common theme in comprehensive joint medical surveillance, in support of Force Health Protection, is the identification and assessment of potential environmental health hazards, and the evaluation and documentation of actual exposures in both a continental US and outside a continental US setting. For the continental US assessments, the USACHPPM has utilized the US Environmental Protection Agency (EPA) database for risk management plans in accordance with Public Law 106-40, and the toxic release inventory database, in a state-of the art geographic information systems based program, termed the Consequence Assessment and Management Tool Set, or CATS, for assessing homeland industrial chemical hazards outside the military gates. As an example, the US EPA toxic release inventory and risk management plans databases are queried to determine the types and locations of industries surrounding a continental US military installation. Contaminants of concern are then ranked with respect to known toxicological and physical hazards, where they are then subject to applicable downwind hazard simulations using applicable meteorological and climatological data sets. The composite downwind hazard areas are mapped in relation to emergency response planning guidelines (ERPG), which were developed by the American Industrial Hygiene Association to assist emergency response personnel planning for catastrophic chemical releases. In addition, other geographic referenced data such as transportation routes, satellite imagery and population data are included in the operational, equipment, and morale risk assessment and management process. These techniques have been developed to assist military medical planners and operations personnel in determining the industrial hazards, vulnerability assessments and health risk assessments to continental United States military installations. These techniques and procedures support the Department of Defense Force Protection measures, which provides awareness of a terrorism threat, appropriate measures to prevent terrorist attacks and mitigate terrorism's effects in the event that preventive measures are ineffective.

Jeffrey S Kirkpatrick; Jacqueline M Howard; David A Reed

2002-01-01T23:59:59.000Z

49

Cyber security best practices for the nuclear industry  

SciTech Connect (OSTI)

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

50

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

51

U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.  

SciTech Connect (OSTI)

This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

Abeyta, Henry J.

2010-05-01T23:59:59.000Z

52

Optimizing Port of Entry Inspection Securing our ports and harbors is a major component of protecting our homeland. The  

E-Print Network [OSTI]

Optimizing Port of Entry Inspection Mission Securing our ports and harbors is a major component port could be crippling. However, exhaustive examination of each container is prohibitively expensive of goods through the port. In practice, a range of methods is available for cargo screening. Of these

53

DOE and Industry Showcase New Control Systems Security Technologies at  

Broader source: Energy.gov (indexed) [DOE]

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

54

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

10 10 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2010 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/17/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4459 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2010

55

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 2 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2002 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/09/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4451 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2002

56

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 6 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2006 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/13/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4455 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2006

57

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 3 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2003 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/10/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4452 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2003

58

Defense Office of Hearings & Appeals Decisions- Industrial Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 8 Law Data/Tools Law You are here Data.gov » Communities » Law » Data Defense Office of Hearings & Appeals Decisions- Industrial Security Clearance Decisions-2008 Dataset Summary Description adjudication of security clearance cases for contractor personnel Tags {"security clearance","national security","defense industry","defense contractor"} Dataset Ratings Overall 0 No votes yet Data Utility 0 No votes yet Usefulness 0 No votes yet Ease of Access 0 No votes yet Dataset Additional Information Last Updated 05/15/2011 Publisher Department of Defense Contact Name Contact Email dohastatus@osdgc.osd.mil Unique Identifier DOD-4457 Public Access Level public Data Dictionary http://www.dod.gov/dodgc/doha/industrial/ Data Download URL http://www.dod.gov/dodgc/doha/industrial/2008

59

Federal technology transfer requirements :a focused study of principal agencies approaches with implications for the Department of Homeland Security.  

SciTech Connect (OSTI)

This report provides relevant information and analysis to the Department of Homeland Security (DHS) that will assist DHS in determining how to meet the requirements of federal technology transfer legislation. These legal requirements are grouped into five categories: (1) establishing an Office of Research and Technology Applications, or providing the functions thereof; (2) information management; (3) enabling agreements with non-federal partners; (4) royalty sharing; and (5) invention ownership/obligations. These five categories provide the organizing framework for this study, which benchmarks other federal agencies/laboratories engaged in technology transfer/transition Four key agencies--the Department of Health & Human Services (HHS), the U.S. Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Defense (DoD)--and several of their laboratories have been surveyed. An analysis of DHS's mission needs for commercializing R&D compared to those agencies/laboratories is presented with implications and next steps for DHS's consideration. Federal technology transfer legislation, requirements, and practices have evolved over the decades as agencies and laboratories have grown more knowledgeable and sophisticated in their efforts to conduct technology transfer and as needs and opinions in the federal sector have changed with regards to what is appropriate. The need to address requirements in a fairly thorough manner has, therefore, resulted in a lengthy paper. There are two ways to find summary information. Each chapter concludes with a summary, and there is an overall ''Summary and Next Steps'' chapter on pages 57-60. For those readers who are unable to read the entire document, we recommend referring to these pages.

Koker, Denise; Micheau, Jill M.

2006-07-01T23:59:59.000Z

60

Page 1 of 21 Vertical integration in a growing industry: security of supply  

E-Print Network [OSTI]

is to secure supply and mitigate risks of price volatility. Oil and gas firms move upstream to enhance securityPage 1 of 21 Vertical integration in a growing industry: security of supply and market access of the industry boundaries, (ii) security of supply and (iii) access to market. The permeability of industry

Aickelin, Uwe

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

: Equipment Condition Proper connection of all components Functionality Air filtration Types of filters in use Filter efficiencies Locations of filters Condition of filters Controls Types of controls Energy management system in use.... Filtration Filtration removes unwanted substances from the air. Different types of filters and levels of efficiency offer varying degrees of protection against everyday pollutants and CBR contaminants. Properly chosen, installed, and maintained air...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

62

Securing major investment in the UK timber processing industry  

E-Print Network [OSTI]

Egger UK Securing major investment in the UK timber processing industry objectives An Austrian, for a £100 million investment. Egger UK supplies 25% of the UK demand for chipboard. Investment in a new. This investment will catalyse active woodland management helping to create and maintain vital habitats for rare

63

Transfer of security technology from Sandia to industry  

SciTech Connect (OSTI)

The National Competitiveness Technology Transfer Act of 1989 made technology transfer a mission for the national laboratories. The intent is to maximize the benefit from public monies and to improve the economic position of US industry in the world marketplace. A key instrument created by this legislation is the Cooperative Research and Development Agreement (CRADA) between a private company and a government-owned contractor-operated R D lab. Under these provisions, the national laboratories can negotiate directly with industry, grant title to intellectual property developed in a CRADA, and withhold publication of commercially-valuable information developed in a CRADA for up to five years. Sandia National Laboratories is very proactive in the transfer of technology developed as the DOE lead laboratory for physical security R D and from work for other government agencies. Specific security-related products have frequently evolved from government user needs into initial concepts followed by research and development into field prototypes which finally have a system design package appropriate for transfer to industry. In the past year several meetings announced in the Commerce Business Daily (CBD) were held with industry to present specific systems and to initiate discussions toward establishing a GRADA and/or granting a product license. Several examples and updates will be presented to illustrate this new process for security technology transfer from Sandia to industry. 2 refs.

Williams, J.D.; Matter, J.C.

1991-01-01T23:59:59.000Z

64

Oak Ridge National Laboratory - Global Security Directorate  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

65

Electrical Engineering Professor J.C. Chiao Quite often these days, the defense industry or Homeland Security come calling on  

E-Print Network [OSTI]

. It was there almost five years ago that he listened attentively to a talk by Shou-Jiang Tang, a clinician to stay in place for 48 hours," Chiao said. Many patients are so conscious of the device that they stop cancer screening." Listening to the lecture, Chiao had a "eureka!" moment about the acid reflux

Chiao, Jung-Chih

66

Nevada National Security Site Industrial Sites Project Closeout - 12498  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office is responsible for environmental restoration (ER) at the Nevada National Security Site (NNSS). This includes remediation at Industrial Sites where past nuclear testing activities and activities that supported nuclear testing may have or are known to have resulted in the release of contaminants into the environment. Industrial Sites at the NNSS have included nuclear facilities that supported the nuclear rocket/missile development programs, gas stations, landfills, spill sites, ordnance sites, and numerous other waste disposal and release sites. The NNSS Industrial Sites activities neared completion at the end of fiscal year 2011 while other activities required under the Federal Facility Agreement and Consent Order (FFACO) and part of the same NNSS ER Project are forecasted to extend to 2027 or beyond. With the majority of Industrial Sites corrective action units (CAUs) completed (more than 250 CAUs and over 1,800 corrective action sites), it was determined that an activity closeout process should be implemented to ensure that the work completed over the past 15 years is well documented in a comprehensive and concise summary. While the process used to close each individual CAU is described in approved documents, no single document describes in summary fashion the work completed to close the many individual Industrial Sites. The activity closeout process will be used to develop an Industrial Sites closeout document that describes these years of work. This document will summarize the number of Industrial Sites closed under the FFACO and provide general descriptions of projects, contaminants removed, and sites closed in place with corresponding Use Restrictions. Other pertinent information related to Industrial Sites work such as the project history, closure decisions, historical declarations, remediation strategies, and final CAU status will be included in the closeout document, along with a table listing each CAU and corresponding corrective action sites within each CAU. Using this process of conducting the activity closeout and developing a closeout document may prove useful for other ER projects within the DOE complex in describing how a long period of ER can be summarized in a single document. The NNSS Industrial Sites activities were completed over the span of 15 years and involved the investigation, cleanup or Use Restriction, and closure of more than 260 CAUs and over 1,800 sites. These activities will conclude in FY 2012 (with the exception of one CAU). In order to capture the work completed over this length of time and document decisions made during the activities, a closeout effort was initiated. The closeout will review the work conducted during the Industrial Sites activities and produce a single document that summarizes Industrial Sites activities. This closeout is being conducted at an interim stage in the overall NNSA/NSO ER Project since the Soils and UGTA activities will continue for a number of years, but the completion of the Industrial Sites project warrants conducting a closeout now while personnel are available and information is still current. The process followed by NNSA/NSO in conducing project closeout for the Industrial Sites portion of the ER program may prove useful within the DOE complex in demonstrating how a large ER project can be summarized. (authors)

Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, Las Vegas, Nevada 89193 (United States); Krauss, Mark [S.M. Stoller for Navarro-Intera, LLC, Las Vegas, Nevada 89193 (United States); Matthews, Pat [Navarro-Intera, LLC, Las Vegas, Nevada 8919 (United States)

2012-07-01T23:59:59.000Z

67

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

68

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

69

Industrial-Strength UPF | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and beyond. Suppliers that can meet UPF standards will be able to compete for work in the pharmaceutical, aerospace and defense industries or in any industry that demands high...

70

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Broader source: Energy.gov (indexed) [DOE]

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

71

first responders | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Blog Home first responders first responders Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

72

render safe | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

at NNSA Blog Home render safe render safe Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

73

consequence management | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

consequence management consequence management Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security...

74

Industry Day and One-on-One Meetings | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Industry Day and One-on-One Meetings | National Nuclear Security Industry Day and One-on-One Meetings | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Industry Day and One-on-One Meetings Home > About Us > Our Operations > Acquisition and Project Management > Major Contract Solicitations > Environmental Program Services Contract >

75

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

76

A Role for Industry in Promoting Nuclear Security and Nonproliferation  

SciTech Connect (OSTI)

Industry has a unique opportunity and critical role to play in strengthening governmental efforts to prevent the spread of nuclear, radiological, and dual-use materials and technologies that could be used in a nuclear or radiological weapon. Governmental regulations and policies are in effect at both the national and international levels to inhibit access to such materials and technologies by illegitimate end-users. However, the discovery of an illegal nuclear network, spearheaded by Pakistani scientist A Q Khan, increased international concern about what more could be done to prevent proliferation. Industry is well-poised and has a strong incentive to take a more proactive role to complement existing governmental efforts. Companies can be a tremendous help in ensuring that illicit diversions do not occur by increasing their oversight over the supply chain.

Hund, Gretchen; Seward, Amy M.; Elkhamri, Oksana O.

2009-11-01T23:59:59.000Z

77

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

78

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA  

Broader source: Energy.gov (indexed) [DOE]

BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA BRIEFINGS ON PHYSICAL SECURITY OF ELECTRICITY SUBSTATIONS - SAN JOSE, CA Briefings on Physical Security of Electricity Substations The Department of Energy (DOE) and Department of Homeland Security (DHS), in coordination with the Federal Bureau of Investigation, the Federal Energy Regulatory Commission's Office of Energy Infrastructure Security, the Electricity Sector Information Sharing and Analysis Center (ES-ISAC), North American Electricity Reliability Corporation (NERC), and industry experts, will conduct a series of briefings across the country with electricity sector owners and operators, and local law enforcement on the physical security of electricity substations. The session for FEMA Region IX will be held in San Jose, CA and hosted by

79

Planning for Emergencies | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related News DOENNSA Participates in Large-Scale CTBT On-Site Inspection Exercise in Jordan HQ Emergency Management Team (EMT) Homeland Security and Emergency Management...

80

Exercise Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Related News DOENNSA Participates in Large-Scale CTBT On-Site Inspection Exercise in Jordan HQ Emergency Management Team (EMT) Homeland Security and Emergency Management...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

National Security Photo Gallery | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Defense, Department of Homeland Security, state and local government agencies, private sector companies. Research for international organizations has involved the World...

82

Jeff Cornett Manager, Industrial and Economic Development  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bureau of Shipping (ABS Consulting) assigned to projects with the Department of Homeland Security, Railroad Research Foundation, maritime port operators, and numerous chemical...

83

SRS upgrades helium recovery system | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

detectors employed by the United States Department of Homeland Security to detect neutron activity from nuclear material. Savannah River Nuclear Solutions, LLC, the management...

84

Homeland Renewable Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Homeland Renewable Energy LLC Homeland Renewable Energy LLC Jump to: navigation, search Name Homeland Renewable Energy LLC Place Langhorne, Pennsylvania Zip 19047 Product Holding company for Fibrowatt LLC and its subsidiaries, which develop poultry litter-fuelled power plants in the US. Coordinates 40.176396°, -74.918884° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40.176396,"lon":-74.918884,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

85

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

86

Department of Energy Launches Initiative with Industry to Better Protect  

Broader source: Energy.gov (indexed) [DOE]

Initiative with Industry to Better Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats January 5, 2012 - 12:20pm Addthis Washington, D.C. - As part of the Obama Administration's efforts to enhance the security and reliability of the nation's electrical grid, U.S. Energy Secretary Steven Chu today announced an initiative to further protect the electrical grid from cyber attacks. The "Electric Sector Cybersecurity Risk Management Maturity" project, a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS), will leverage the insight of private industry and public sector experts to build on existing cybersecurity measures and

87

Best Practices for the Security of Radioactive Materials  

SciTech Connect (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

88

Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications  

E-Print Network [OSTI]

Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

Schools, Chad C

2014-01-01T23:59:59.000Z

89

Industrial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Products Industrial Institutional Multi-Sector Residential Momentum Savings Regional Efficiency Progress Report Utility Toolkit Energy Smart Industrial - Energy Management...

90

Industry  

E-Print Network [OSTI]

2004). US DOEs Industrial Assessment Centers (IACs) are anof Energys Industrial Assessment Center program in SMEs

Bernstein, Lenny

2008-01-01T23:59:59.000Z

91

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

92

Directionally Sensitive Neutron Detector For Homeland Security Applications  

E-Print Network [OSTI]

Radiation Portal Monitor SNM Special Nuclear Material US United States vii TABLE OF CONTENTS Page ABSTRACT ................................................................................................................. iii ACKNOWLEDGEMENTS... of Existing Radiation Portal Monitors............................ 7 II.B. Previous Work in the Field of Directionally Sensitive Detectors ...... 11 III THEORY...

Spence, Grant

2012-02-14T23:59:59.000Z

93

Department of Homeland Security, Science and Technology Directorate...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a power generator continuously. The algae biomass then can be digested anaerobically for biogas production. This could be a short-term research project. Initial test and...

94

PNNLs Data Intensive Computing research battles Homeland Security threats  

ScienceCinema (OSTI)

The Pacific Northwest National Laboratorys (PNNL's) approach to data intensive computing (DIC) is focused on three key research areas: hybrid hardware architecture, software architectures, and analytic algorithms. Advancements in these areas will help to address, and solve, DIC issues associated with capturing, managing, analyzing and understanding, in near real time, data at volumes and rates that push the frontiers of current technologies.

David Thurman; Joe Kielman; Katherine Wolf; David Atkinson

2012-12-31T23:59:59.000Z

95

PNNLs Data Intensive Computing research battles Homeland Security threats  

SciTech Connect (OSTI)

The Pacific Northwest National Laboratorys (PNNL's) approach to data intensive computing (DIC) is focused on three key research areas: hybrid hardware architecture, software architectures, and analytic algorithms. Advancements in these areas will help to address, and solve, DIC issues associated with capturing, managing, analyzing and understanding, in near real time, data at volumes and rates that push the frontiers of current technologies.

David Thurman; Joe Kielman; Katherine Wolf; David Atkinson

2009-12-01T23:59:59.000Z

96

The Department of Homeland Security (DHS) Funding Opportunity Announcement (FOA)  

E-Print Network [OSTI]

on the "Search Grants" tab. Enter the FOA Number located on the cover of this announcement. Click and development activities. See "Appendix B - Terms and Conditions" for additional details of substantial

Rhode Island, University of

97

Before the Senate Homeland Security and Governmental Affairs...  

Office of Environmental Management (EM)

& Publications GAO-05-123 Department of Energy: Further Actions Are Needed to Strengthen Contract Management for Major Projects module 4 Chapter 34 - Major Systems Acquisition...

98

The Department of Homeland Security Energy Management Program...  

Office of Environmental Management (EM)

covers the FUPWG Meeting, held on May 1-2, 2007 in Cape Canaveral, Florida. fupwgccwhite.pdf More Documents & Publications AL2007-08.doc&0; Policy Flash 2015-06 Energy Star...

99

Passive Neutron Detection in Ports for Homeland Security Applications  

E-Print Network [OSTI]

with experimental measurements showed that detectors parallel to the surface of water were best at detecting neutron sources below the surface. Additionally, stacking detectors and placing a cadmium sheet between the polyethylene blocks resulted in a greater...

Pedicini, Eowyn E

2013-05-07T23:59:59.000Z

100

Preliminary Benchmarking and MCNP Simulation Results for Homeland Security  

SciTech Connect (OSTI)

The purpose of this article is to create Monte Carlo N-Particle (MCNP) input stacks for benchmarked measurements sufficient for future perturbation studies and analysis. The approach was to utilize historical experimental measurements to recreate the empirical spectral results in MCNP, both qualitatively and quantitatively. Results demonstrate that perturbation analysis of benchmarked MCNP spectra can be used to obtain a better understanding of field measurement results which may be of national interest. If one or more spectral radiation measurements are made in the field and deemed of national interest, the potential source distribution, naturally occurring radioactive material shielding, and interstitial materials can only be estimated in many circumstances. The effects from these factors on the resultant spectral radiation measurements can be very confusing. If benchmarks exist which are sufficiently similar to the suspected configuration, these benchmarks can then be compared to the suspect measurements. Having these benchmarks with validated MCNP input stacks can substantially improve the predictive capability of experts supporting these efforts.

Robert Hayes

2008-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Nuclear and solar energy implications for homeland security .  

E-Print Network [OSTI]

??In the eyes of many experts, the world is moving away from oil as a cheap energy source. As this future unfolds, the United States (more)

Thibeaux, Allen L.

2008-01-01T23:59:59.000Z

102

Environmental Security and Restoration [EVS Program Area]  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Security and Restoration Environmental Security and Restoration EVS focuses on environmental and human health aspects of homeland and national security, as well as restoration of sites contaminated with hazardous materials. Contamination in our environment - in air, water, and soil - contributes to health problems and affects the quality of our lives. The EVS Division confronts this challenge by addressing environmental and human health aspects of homeland and national security and by characterizing and restoring sites contaminated with hazardous materials. We integrate extensive expertise in engineering, health physics, hydrogeology, environmental science, chemistry, spatial analysis, database management, and computer programming to contribute to environmental security and restoration.

103

Vertical Integration in a Growing Industry: Security of Supply and Market Access in  

E-Print Network [OSTI]

4. Entrepreneurial start-ups 5. Oil and Gas firms and downstream marketers #12;11 Permeability of Boundaries Land Cultivation Trading Distribution Retailing Food, Feed, IndustrialProcessing Exploration biofuels for road transport Bio-diesel : vegetable oil based substitute for diesel Bio-ethanol : alcohol

Aickelin, Uwe

104

SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)  

Science Journals Connector (OSTI)

The purpose of this document is to provide guidance for securing industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other systems performing control functions. ... Keywords: Cyber-physcial systems, ICS, Industrial Control Systems, SCADA, Supervisory Control and Data Acquisition, security controls, threats, vulnerabilities

Keith A. Stouffer; Joseph A. Falco; Karen A. Scarfone

2011-06-01T23:59:59.000Z

105

Industry  

E-Print Network [OSTI]

Information on corn wet milling. Corn Refiners Association corn wet milling industry: An ENERGYas an automotive fuel. Corn wet milling is the most energy-

Bernstein, Lenny

2008-01-01T23:59:59.000Z

106

Industry  

E-Print Network [OSTI]

increased use of biomass and energy efficiency improvements,Moreira, J. , 2006: Global biomass energy potential. Journal19712004 Notes 1) Biomass energy included 2) Industrial

Bernstein, Lenny

2008-01-01T23:59:59.000Z

107

Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

An Exploration of Innovation and An Exploration of Innovation and Energy Efficiency in an Appliance Industry Prepared by Margaret Taylor, K. Sydny Fujita, Larry Dale, and James McMahon For the European Council for an Energy Efficient Economy March 29, 2012 ERNEST ORLANDO LAWRENCE BERKELEY NATIONAL LABORATORY LBNL - 5689E An Exploration of Innovation and Energy Efficiency in an Appliance Industry Abstract This report provides a starting point for appliance energy efficiency policy to be informed by an understanding of: the baseline rate and direction of technological change of product industries; the factors that underlie the outcomes of innovation in these industries; and the ways the innovation system might respond to any given intervention. The report provides an overview of the dynamics of energy efficiency policy and innovation in the appliance

108

Industry  

E-Print Network [OSTI]

for im- proving energy efficiency of corn wet milling havefor the corn wet milling industry: An ENERGY STAR Guide forfuel. Corn wet milling is the most energy-intensive food

Bernstein, Lenny

2008-01-01T23:59:59.000Z

109

Industry  

E-Print Network [OSTI]

options for combined heat and power in Canada. Office ofpolicies to promote combined heat and power in US industry.with fuel inputs in combined heat and power plants being

Bernstein, Lenny

2008-01-01T23:59:59.000Z

110

Industry  

E-Print Network [OSTI]

EJ of primary energy, 40% of the global total of 227 EJ. Bytotal energy use by industry and on the fraction of electricity use consumed by motor driven systems was taken as representative of global

Bernstein, Lenny

2008-01-01T23:59:59.000Z

111

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

112

Industry  

SciTech Connect (OSTI)

This chapter addresses past, ongoing, and short (to 2010) and medium-term (to 2030) future actions that can be taken to mitigate GHG emissions from the manufacturing and process industries. Globally, and in most countries, CO{sub 2} accounts for more than 90% of CO{sub 2}-eq GHG emissions from the industrial sector (Price et al., 2006; US EPA, 2006b). These CO{sub 2} emissions arise from three sources: (1) the use of fossil fuels for energy, either directly by industry for heat and power generation or indirectly in the generation of purchased electricity and steam; (2) non-energy uses of fossil fuels in chemical processing and metal smelting; and (3) non-fossil fuel sources, for example cement and lime manufacture. Industrial processes also emit other GHGs, e.g.: (1) Nitrous oxide (N{sub 2}O) is emitted as a byproduct of adipic acid, nitric acid and caprolactam production; (2) HFC-23 is emitted as a byproduct of HCFC-22 production, a refrigerant, and also used in fluoroplastics manufacture; (3) Perfluorocarbons (PFCs) are emitted as byproducts of aluminium smelting and in semiconductor manufacture; (4) Sulphur hexafluoride (SF{sub 6}) is emitted in the manufacture, use and, decommissioning of gas insulated electrical switchgear, during the production of flat screen panels and semiconductors, from magnesium die casting and other industrial applications; (5) Methane (CH{sub 4}) is emitted as a byproduct of some chemical processes; and (6) CH{sub 4} and N{sub 2}O can be emitted by food industry waste streams. Many GHG emission mitigation options have been developed for the industrial sector. They fall into three categories: operating procedures, sector-wide technologies and process-specific technologies. A sampling of these options is discussed in Sections 7.2-7.4. The short- and medium-term potential for and cost of all classes of options are discussed in Section 7.5, barriers to the application of these options are addressed in Section 7.6 and the implication of industrial mitigation for sustainable development is discussed in Section 7.7. Section 7.8 discusses the sector's vulnerability to climate change and options for adaptation. A number of policies have been designed either to encourage voluntary GHG emission reductions from the industrial sector or to mandate such reductions. Section 7.9 describes these policies and the experience gained to date. Co-benefits of reducing GHG emissions from the industrial sector are discussed in Section 7.10. Development of new technology is key to the cost-effective control of industrial GHG emissions. Section 7.11 discusses research, development, deployment and diffusion in the industrial sector and Section 7.12, the long-term (post-2030) technologies for GHG emissions reduction from the industrial sector. Section 7.13 summarizes gaps in knowledge.

Bernstein, Lenny; Roy, Joyashree; Delhotal, K. Casey; Harnisch, Jochen; Matsuhashi, Ryuji; Price, Lynn; Tanaka, Kanako; Worrell, Ernst; Yamba, Francis; Fengqi, Zhou; de la Rue du Can, Stephane; Gielen, Dolf; Joosen, Suzanne; Konar, Manaswita; Matysek, Anna; Miner, Reid; Okazaki, Teruo; Sanders, Johan; Sheinbaum Parado, Claudia

2007-12-01T23:59:59.000Z

113

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect (OSTI)

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

114

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

115

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

116

Industrial  

Gasoline and Diesel Fuel Update (EIA)

Industrial Industrial 8,870,422 44.3% Commercial 3,158,244 15.8% Electric Utilities 2,732,496 13.7% Residential 5,241,414 26.2% Source: Energy Information Administration (EIA), Form EIA-176, "Annual Report of Natural and Supplemental Gas Supply and Disposition." T e x a s L o u i s i a n a C a l i f o r n i a A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Industrial Billion Cubic Meters T e x a s C a l i f o r n i a F l o r i d a A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Electric Utilities Billion Cubic Meters N e w Y o r k C a l i f o r n i a I l l i n o i s A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Commercial Billion Cubic Meters I l l i n o i s C a l i f o r n i a N e w Y o r k A l l O t h e r S t a t e s 0 1 2 3 4 5 0 30 60 90 120 Trillion Cubic Feet Residential Billion Cubic Meters 11. Natural Gas Delivered to Consumers in the United States, 1996 Figure Volumes in Million Cubic Feet Energy Information Administration

117

Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

SciTech Connect (OSTI)

The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Price, D E; Durling, R L

2005-10-10T23:59:59.000Z

118

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

119

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

120

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Nuclear Forensics | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Forensics | National Nuclear Security Administration Forensics | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Forensics Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Nuclear Forensics Nuclear Forensics Forensics Operations The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security

122

Chapter_1_Physical_Security  

Broader source: Energy.gov (indexed) [DOE]

Physical Security Physical Security This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Title 10 Code of Federal Regulations (CFR) Part 860.4 * Title 41 CFR Parts 101-19.3 and 102.74, Subpart C * Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors * DOE Order 473.3, Protection Program Operations * DOE Order 471.6, Information Security * DOE Order 580.1, Change 1, DOE Personal Property Management Program The objective of these directives is to protect DOE sensitive and classified information, facilities, property, and employees from threats posed by intelligence collectors, terrorists, violent activists,

123

Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

124

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Spectroscopic Personal Radiation Detectors (SPRDs) for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

125

Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland  

E-Print Network [OSTI]

Testing and Evaluation Protocol for Mobile and Transportable Radiation Monitors Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

126

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

127

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

128

Before the Subcommittee on Financial and Contracting Oversight- Committee on Homeland Security and Governmental Affairs  

Broader source: Energy.gov [DOE]

Subject: Overview of DOE Office of Environmental Management acquisitions and contract project management reforms By: J.E. "Jack" Surash, Deputy Assistant Secretary for Acquisition and Project Management

129

Economics definitions, methods, models, and analysis procedures for Homeland Security applications.  

SciTech Connect (OSTI)

This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

2010-01-01T23:59:59.000Z

130

Department of Homeland Security U.S. Citizenship and Immigration Services  

E-Print Network [OSTI]

individual (other than an alien not authorized to work in the United States) in hiring, discharging) hired after November 6, 1986, is authorized to work in the United States. When Should Form I-9 Be Used that Section 1 is timely and properly completed. Noncitizen nationals of the United States are persons born

Oklahoma, University of

131

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

132

Industry Interactive Procurement System (IIPS)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industry Interactive Industry Interactive Industry Interactive Industry Interactive Procurement System Procurement System (IIPS) (IIPS) Douglas Baptist, Project Manager Information Management Systems Division US Department of Energy IIPS Functions Issue synopses, solicitations and related documents via the Internet Receive and Respond to Solicitation Specific Questions Receive proposal, bid or application information electronically Provide access to proposal information to authorized personnel through a web browser Conduct negotiations or obtain clarifications Issue award documents IIPS Security Security Plan in place and approved by DOE's Chief Information Officer System security tested by DOE's Computer Incident Advisory Capability team Security measures include: - Encryption on the IIPS server

133

Cyber Security Issues and Requirements  

Broader source: Energy.gov (indexed) [DOE]

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

134

Before the Senate Homeland Security and Governmental Affairs Subcommittee on Federal Financial Management, Government Information, Federal Services and International Security  

Broader source: Energy.gov [DOE]

Subject: Cutting the Federal Government's Energy Bill: An Examination of the Sustainable Federal Government Executive Order 13524 By: Richard Kidd, Program Manager Federal Energy Management Program, Office of Energy Efficiency and Renewable Energy

135

Industry Alliance Industry Alliance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industry Alliance Industry Alliance Clean, Sustainable Energy for the 21st Century Industry Alliance Industry Alliance Clean, Sustainable Energy for the 21st Century October, 2010...

136

Security is Not an Option | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other industries....

137

Private Security and the Law, 4 edition  

Science Journals Connector (OSTI)

Private Security and the Law, 4th Edition, is a unique resource that provides analysis of practices in the security industry as they relate to law, regulation, licensure, and constitutional questions of case and statutory authority.This ...

Charles Nemeth

2011-10-01T23:59:59.000Z

138

Security Forms and Information | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Services » New Employee Orientation » Security Forms and Services » New Employee Orientation » Security Forms and Information Security Forms and Information Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees assigned to the DOE Headquarters complex are required to present two identity source documents (i.e., U.S. Passport, driver's license, identification card with photograph issued by a Federal, state, or local government agency, etc.), have their fingerprints taken, and undergo a background investigation (the identity proofing process) prior to reporting for duty or being issued a DOE standard badge (identity or PIV badge). Most likely, your HR representative and/or administrative personnel have

139

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

140

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

142

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

143

Insider threat to secure facilities: data analysis  

SciTech Connect (OSTI)

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

144

Related Links | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Los Alamos Field Office > Related Los Alamos Field Office > Related Links Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste Isolation Pilot Plant U.S. Department of Homeland Security Code of Federal Regulations Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program

145

Securing Infrastructure from High Explosive Threats  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

146

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

147

NUCLEAR ENERGY SECURITY FELLOWS  

Broader source: Energy.gov [DOE]

Overview: The NESFP is aligned with the already well-established Homeland Defense Fellowship (HDF) Program, which is comprised of international military officers and US interagency personnel. NESFP...

148

National Security & Safety Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

July 2, 2012 July 2, 2012 Inspection Report: INS-O-12-02 Management of Explosives at Selected Department Sites June 29, 2012 Audit Report: OAS-M-12-05 Office of Secure Transportation Capabilities May 31, 2012 Audit Report: IG-0866 Integrated Safety Management at Sandia National Laboratories April 23, 2012 Audit Report: OAS-L-12-05 The Joint Actinide Shock Physics Experimental Research Facility at the Nevada National Security Site March 6, 2012 Inspection Report: INS-L-12-02 Follow-up Inspection on Security Clearance Terminations and Badge Retrieval at the Lawrence Livermore National Laboratory February 28, 2012 Audit Report: IG-0860 The Department of Energy's Implementation of Homeland Security Presidential Directive 12 November 15, 2011 Evaluation Report: OAS-M-12-01 The Federal Energy Regulatory Commission's Unclassified Cyber Security

149

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Broader source: Energy.gov (indexed) [DOE]

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

150

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Broader source: Energy.gov (indexed) [DOE]

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

151

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

152

Joint Capability Technology Demonstration (JCTD) Industry Day...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Capability Technology Demonstration Industry Day Presentations Partnering with Utilities for Energy Efficiency & Security 2010 Smart Grid Peer Review Day Two Morning Presentations...

153

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

154

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

155

AMI System Security Requirements - v1_01-1 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

156

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

157

Contact Us | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contact Us Contact Us Home > Field Offices > Welcome to the Los Alamos Field Office > Contact Us Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook National Nuclear Security Administration Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security Printer-friendly version Printer-friendly version Facebook Twitter Youtube Flickr General Information About Los Alamos Field Office Contact Us Employee Concerns Program LANS Contract Los Alamos Field Office Emergency Public Information Related Links

158

Argonne Chemical Sciences & Engineering - People - National Security -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security National Security Nuclear Forensics and Nanoscale Engineering Chemical Analysis and Research Analytical Chemistry Laboratory Management and Support David B. Chamberlain, Chemical Engineer and Department Manager phone: 630/252-7699, fax: 630/972-4409, e-mail: david.chamberlain@anl.gov M.S., Chemical Engineering, University of Idaho Spent fuel reprocessing Radiological forensics Sealed radioactive source characterization Radioactive materials and national security Mary Anne Yates, Senior Technical Advisor/Senior Chemist phone: 630/252-7699, fax: 630/972-4409, e-mail: mayates@anl.gov Ph.D., Nuclear Chemistry, Carnegie Mellon University Homeland Security Counterterrorism Publications in nuclear, atomic, and particle physics Jodi L. Canaday, Administrative Secretary

159

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

160

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

The Resilient Economy: Integrating Competitiveness and Security  

SciTech Connect (OSTI)

Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

Debbie van Opstal

2009-01-07T23:59:59.000Z

162

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

163

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

164

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

165

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

166

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

167

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

168

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

169

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

170

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

171

National Security Studies Program | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

National Security Studies Program National Security Studies Program National Security Studies Program Objective The National Security Studies Program (NSSP) is designed to prepare future leaders of civilian agencies for high-level policy, command, and staff responsibilities. The NSSP focuses on international environments and commercial partnerships. All students successfully completing the program are awarded a Master's degree. The program does not involve a promotion or a change in position. Benefits to the Organization The program prepares federal civilian employees for high-level policy, command, and staff responsibilities. Participants will gain valuable experience in leadership, information strategy, national security studies, military strategy, logistics, economics, industry studies, and more. The

172

Saudi National Security. Research report  

SciTech Connect (OSTI)

The purpose of this research paper is to focus on Saudi National Security. The author highlights geographic and historic factors that impact on threats to Saudi Arabia, and the objectives for providing security. He discusses how to achieve these objectives, including military readiness and cooperation with other countries to guarantee Saudi security. This is to ensure interests which are vital to the industrial world as the result of a continued flow of oil with a reasonable price. Given is the author`s opinion about U.S. political strategy in the region to achieve stability in the Gulf Region.

Al-Ayed, I.

1996-05-01T23:59:59.000Z

173

Testimony before a Joint Meeting of the Senate Finance Committee and the Senate Transportation and Homeland Security Committee  

E-Print Network [OSTI]

, projected fuel efficiencies, their impact on fuel tax revenues, and construction commodity prices. I will do, and consequently the price of gasoline and diesel fuel, in 2008 there was a great deal of discussion, not only in the early 1970s, corresponding to a rapid increase in fuel price. Another decrease in VMT occurred

174

Department of Homeland Security Inventory DHS_inventory_form_revision_4_2011.doc Page 1 of 5  

E-Print Network [OSTI]

-90-3 Phosphorus oxychloride 10025-87-3 Phosphorus trichloride 7719-12-2 Thiodiglycol 111-48-8 #12;Department feet) Acetylene 74-86-2 Ammonia (anhydrous) 7664-41-7 Arsine 7784-42-1 Boron trichloride 10294-77-4 Diborane 19287-45-7 Dichlorosilane 4109-96-0 Dinitrogen tetroxide 10544-72-6 Fluorine 7782-41-4 Germane

Pawlowski, Wojtek

175

Preliminary Study on Coal Industrial Safety Evaluation Index System Under Low-Carbon Economy  

Science Journals Connector (OSTI)

Coal industry occupies a dominant position in our ... problems becoming increasingly prominent, the constraints on economic development are increasingly influencing the stable and ... of the industrial security. ...

Lei Zhang; Cheng Chen

2013-01-01T23:59:59.000Z

176

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

177

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

178

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

179

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

180

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Erera, Spring School 2004 Transportation Security  

E-Print Network [OSTI]

and Systems Engineering Georgia Institute of Technology #12;Erera, Spring School 2004 Outline ! UnderstandingErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial ! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportation

Erera, Alan

182

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

183

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

184

Partnering with Utilities for Energy Efficiency & Security  

Broader source: Energy.gov (indexed) [DOE]

SPIDERS SPIDERS Energy Security JCTD Proposal Dr. George Ka'iliwai Mr. Wade Jost USPACOM J8, Director of OSD Power Surety y Task Force Resources and Assessment The RedGate Group This brief is: This brief is: UNCLASSIFIED 1 UNCLASS As of Nov 09 The Situation * "Critical national security y and homeland defense missions are at an unacceptably high risk of extended outage from failure of the electric grid." The Defense Science Board Task Force on DoD Energy Security, July 2008 UNCLASS 2 UNCLASS As of Nov 09 The Situation * "There have been numerous attacks on the operating systems of major critical infrastructure facilities, including power grids, around the world in recent years: Chinese and Russian spies have "penetrated the U S penetrated the U.S.

185

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

186

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

187

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

188

Nuclear Security Conference 2010 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

189

Nuclear Security Conference 2010 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

190

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

191

The Cyber Security Crisis  

SciTech Connect (OSTI)

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

192

Los Alamos National Security, LLC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

has extensive experience in nuclear defense programs, scientific research and development, large-scale facilties management, applying science and technology to homeland...

193

Joint Capability Technology Demonstration (JCTD) Industry Day Agenda  

Broader source: Energy.gov [DOE]

Agenda outlines the activities of the 2014 Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) Joint Capability Technology Demonstration (JCTD) Industry Day in Fort Carson, Colorado.

194

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

195

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

oxide materials into industrially relevant pellet shaped pieces with no reduction in sorption capacity or accessible surface area of the porous oxide material. This technology is...

196

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

197

Visualizing the Cherokee Homeland through Indigenous Historical GIS: An Interactive Map of James Mooney's Ethnographic Fieldwork and Cherokee Collective Memory  

E-Print Network [OSTI]

In 1887, the Bureau of American Ethnology appointed James Mooney to work among the Eastern Band of Cherokee. From 1887 to 1916, Mooney documented the sites and stories of the Cherokee homeland as shared with him by members of the community. Mooney...

Kirk, Deborah Lyn

2013-12-31T23:59:59.000Z

198

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

199

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

200

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

202

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

203

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

204

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

205

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

206

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

207

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Compensation | National Nuclear Security Administration Compensation | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Compensation Home > Federal Employment > Working at NNSA > Compensation Compensation Whether you're a new college graduate, someone with industry experience looking to move into a Federal job or a current government employee looking

208

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

209

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

210

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

211

Day, night and all-weather security surveillance automation synergy from combining two powerful technologies  

SciTech Connect (OSTI)

Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

Morellas, Vassilios; Johnson, Andrew [Honeywell Labs, 3660, Technology Drive, Minneapolis MN 5518 (United States); Johnston, Chris [Honeywell ACS, 1985 Douglas Drive North, Golden Valley MN 55422 (United States); Roberts, Sharon D.; Francisco, Glen L. [L-3 Communications Infrared Products, 13532 N. Central Expressway, Dallas TX 75243 (United States)

2006-07-01T23:59:59.000Z

212

Industrial Engineering Industrial Advisory Board  

E-Print Network [OSTI]

Industrial Engineering Industrial Advisory Board (IAB) #12;PURPOSE: The Texas Tech University - Industrial Engineering Industrial Ad- visory Board (IAB) is an association of professionals with a com- mon goal - promoting and developing the Texas Tech Department of Industrial Engineering and its students

Gelfond, Michael

213

What Makes Securities Arbitration Different from Other Consumer and Employment Arbitration?  

E-Print Network [OSTI]

This short piece emphasizes what makes consumer and employment arbitration in the securities industry different from consumer and employment arbitration generally. Securities law imposes non-contractual duties to arbitrate on both broker...

Ware, Stephen J.

2008-01-01T23:59:59.000Z

214

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

215

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

216

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

217

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

218

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

219

Scientific Management in Nationalized Industries  

Science Journals Connector (OSTI)

... Boards of Nationalized Industries"*, arises out of his experience as governing director of two private engineering firms and as chairman of the British Broadcasting Corporation. It is a noteworthy ... of experience, independence and security of tenure as is common in the best concerns of private enterprise; but it is of wider importance as endorsing the stress laid on the ...

1958-02-22T23:59:59.000Z

220

Policies on Japan's Space Industry  

E-Print Network [OSTI]

as a strategic industry Practical space use in National Security Diplomacy ...etc Policy Administrative Structure on the Basic Space Law legislated in 2008. 1. The government sets space policy as a national strategy utilization environment Develop new markets with small size satellites and rockets Promote the serialization

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

222

The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response  

E-Print Network [OSTI]

#12;Preface The threat of terrorism in our homeland became horrifically real on September 11, 2001 in thwarting terrorism. One important area for technical advancement is the development of advanced information

223

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

224

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

225

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

226

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

227

Industrial Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Industrial Industrial Industrial / Manufacturing Buildings Industrial/manufacturing buildings are not considered commercial, but are covered by the Manufacturing Energy Consumption Survey (MECS). See the MECS home page for further information. Commercial buildings found on a manufacturing industrial complex, such as an office building for a manufacturer, are not considered to be commercial if they have the same owner and operator as the industrial complex. However, they would be counted in the CBECS if they were owned and operated independently of the manufacturing industrial complex. Specific questions may be directed to: Joelle Michaels joelle.michaels@eia.doe.gov CBECS Manager Release date: January 21, 2003 Page last modified: May 5, 2009 10:18 AM http://www.eia.gov/consumption/commercial/data/archive/cbecs/pba99/industrial.html

228

The Security Epidemic  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5-1130 5-1130 A different version of this appeared in Security Management 50, pp. 88-94 (2006). Turnkey Turnover Solutions: Powerful Tools and Experts are Available! Eddie G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory Introduction It's early in World War II, and the US is scrambling to put together an effective fighting force. But how to you select and place millions of former civilians into military positions that will suit their abilities and temperament? The Army turned to industrial/organizational (I/O) psychologists. To solve this problem, the I/O psychologists developed the Army General Classification Test (AGCT), which later evolved into the Armed Services Vocational Aptitude Battery (ASVAB) still used

229

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

230

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

231

Microsoft PowerPoint - 5_SCOTT_SLAVENS_Power Point PSA presentation...  

National Nuclear Security Administration (NNSA)

Homeland Security Investigations SSA Greg Slavens CPIC Colorado Springs Counter-Proliferation Investigations 2 Homeland Security Investigations HSI Jurisdictional Authorities ...

232

ITL BULLETIN FOR AUGUST 2011 PROTECTING INDUSTRIAL CONTROL SYSTEMS KEY COMPONENTS OF  

E-Print Network [OSTI]

'S CRITICAL INFRASTRUCTURES Shirley Radack, Editor Computer Security Division Information Technology production, handling, and distribution. ICS are used in many industries: electric, water, oil and gas security vulnerabilities and incidents. To address these threats and vulnerabilities, organizations may

233

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

234

Extranjero en mi tierra (Stranger in My Homeland): Migrant Realities in Mexico's Riviera Maya  

E-Print Network [OSTI]

The explosive growth of Mexico's tourism industry in the Yucatn over the past thirty years has exacerbated the poor living and working conditions of thousands of immigrants in Mexico's Caribbean coast. My main research ...

Sandoval, Erika Manuela

2009-06-15T23:59:59.000Z

235

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

236

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

237

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

238

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

239

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

240

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

242

Securing Our Energy Future  

Broader source: Energy.gov (indexed) [DOE]

Our Energy Our Energy Securing Our Energy Future Future World Energy Demand Growing Dramatically 12 1400 1200 10 1000 2000 2050 2100 Population of Population of Industrialized Countries Industrialized Countries Wo W rl r d o ld Po P pu p la l ti t on o o u a i n Wo W rl r d E d ne n rg r y o l E e gy Co C ns n um u pt p io i n o s m t on Population (Billions) Energy Consumption (Qbtu / yr) 8 800 6 600 4 400 2 200 0 0 1900 1950 Year U.S. Electricity Generation by Fue U.S. Electricity Generation by Fuel Electric Generation by Fuel 1980 - 2030 (billion kilowatt-hours) 0 1000 2000 3000 4000 5000 6000 1980 1990 2000 2010 2020 2030 Renewables/Other Nuclear Natural Gas Petroleum Coal Source: EIA Annual Energy Outlook 2008 Why Do We Keep Coal in the Mix? Why Do We Keep Coal in the Mix? World Energy Reserves World Energy Reserves Source: Energy Information Administration/ International Reserves Data

243

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

244

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

245

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

246

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

247

Large Eddy Simulation of Industrial Flares Philip Smith  

E-Print Network [OSTI]

At the Institute for Clean and Secure Energy at the University of Utah we are focused on education through and private industry companies to promote rapid deployment of new technologies through the use of high to solve many industrially relevant problems such as industrial flares, oxy-coal combustion processes

Utah, University of

248

Industry @ ALS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industry @ ALS Industry @ ALS Industry @ ALS Concrete Industry Benefits from Ancient Romans and the ALS Print Thursday, 17 October 2013 14:24 New insights into the Romans' ingenious concrete harbor structures emerging from ALS beamline research could move the modern concrete industry toward its goal of a reduced carbon footprint. Summary Slide Read more... Moving Industry Forward: Finding the Environmental Opportunity in Biochar Print Thursday, 12 September 2013 08:41 Using ALS Beamlines 10.3.2 and 8.3.2, the Environmental Protection Agency (EPA) is currently investigating how biochar sorbs environmental toxins and which kinds of biochar are the most effective. The possibilities for widespread use have already launched entrepreneurial commercial ventures. Summary Slide

249

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

250

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

251

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

252

ITP Metal Casting: A Vision for the U.S. Metal Casting Industry: 2002 and Beyond  

Broader source: Energy.gov [DOE]

The U.S. metalcasting industry will exhibit increased strength, vitality and innovation, contributing to the nations economy and security.

253

E-Print Network 3.0 - agate industry khambhat Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of western Arabian Sea 47... and pollution forecasting, national security, the oil and gas industry, fisheries management and coastal... low-salinity plume off Gulf of Khambhat,...

254

Industrial Hygienist  

Broader source: Energy.gov [DOE]

A successful candidate in this position wil l serve as an Industrial Hygienist in the Operations Division, providing technical oversight of the Pacific Northwest National Laboratory contractors...

255

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

256

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on altitude. This large flux allows testing of semiconductor devices at greatly accelerated rates. Industry users are invited to contact Steve Wender, phone:505-667-1344 or...

257

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

258

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

259

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

260

Industrial microbiology  

Science Journals Connector (OSTI)

...include the fruit, wine, baking, milling, dairy, and distill-ing industries...fructose known as high fruc-tose corn syrup. Between 500,000 and 1...glucose isomerase has permitted the corn wet milling industry to capture 30 percent of...

AL Demain

1981-11-27T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

262

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

263

Perform, Achieve and Trade (PAT): An Innovative Mechanism for Enhancing Energy Efficiency in India's Industrial Sector  

E-Print Network [OSTI]

On 31st March 2012, India quietly announced a historic regulation for industrial sector in a bid to ensure energy security of the country. The regulation, with an aim to enhance energy efficiency in energy intensive industrial sectors, is empowered...

Garnik, S. P.; Martin, M.

2014-01-01T23:59:59.000Z

264

OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department  

Broader source: Energy.gov (indexed) [DOE]

OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing of industrial control equipment much easier, but has resulted in significantly less isolation from the outside world, resulting in the increased risk of cyber-based attacks impacting industrial production and human safety. OPC Security Whitepaper #3 Hardening Guidelines for OPC Hosts

265

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

266

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

267

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

268

Impact of Electricity Deregulation on Industrial Assessment Strategies  

E-Print Network [OSTI]

efficiency project. Onsite generation of power and the changing rationales for its adoption has also experienced big changes. Energy security is becoming a strong motivation for industrial plants, options are increased, and third party funding is also...

Kasten, D. J.; Muller, M. R.; Pavlovic, F.

269

Industry Perspective  

Broader source: Energy.gov [DOE]

Fuel cell and biogas industries perspectives. Presented by Mike Hicks, Fuel Cell and Hydrogen Energy Association, at the NREL/DOE Biogas and Fuel Cells Workshop held June 11-13, 2012, in Golden, Colorado.

270

Chapter 9 - LNG Safety and Security Aspects  

Science Journals Connector (OSTI)

Abstract The liquefied natural gas (LNG) industry has an excellent safety record. This is due in large part to the combination of industry practice and regulations that are in place to prevent incidents from occurring and to reduce or mitigate the impacts of incidents if they occur. For decades, the LNG industry has also maintained secure operations around the world, including in areas where terrorism is a concern. Even so, the safe and environmentally sound operation of the LNG facilities, both ships and terminals, is a concern and responsibility shared by operators. Hazards in handling LNG and natural gas do exist and it is important not to understate or exaggerate them. This chapter explores hazards associated with and safety features designed for the unusual characteristics of LNG. Also summarized here are regulations governing LNG and a wide framework of various risk assessment methods applicable to LNG shipping and export/import terminals, both onshore and offshore. A compilation is included of accident frequencies for LNG carriers per ship year. Examples are provided of risk analysis for specific ports. Innovative applications of risk analysis are treated, along with current research findings. This chapter also discusses the growing concerns over LNG infrastructure security, some factors associated with security, and recent initiatives undertaken to analyze and improve security.

2014-01-01T23:59:59.000Z

271

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

272

Los Alamos Shows Airport Security Technology at Work  

SciTech Connect (OSTI)

Los Alamos scientists have advanced a Magnetic Resonance Imaging (MRI) technology that may provide a breakthrough for screening liquids at airport security. They've added low-power X-ray data to the mix, and as a result have unlocked a new detection technology. Funded in part by the Department of Homeland Security's Science and Technology Directorate, the new system is named MagRay. The goal is to quickly and accurately distinguish between liquids that visually appear identical. For example, what appears to be a bottle of white wine could potentially be nitromethane, a liquid that could be used to make an explosive. Both are clear liquids, one would be perfectly safe on a commercial aircraft, the other would be strictly prohibited. How to tell them apart quickly without error at an airport security area is the focus of Michelle Espy, Larry Schultz and their team. In this video, Espy and the MagRay team explain how the new technology works, how they've developed an easy operator interface, and what the next steps might be in transitioning this technology to the private sector.

Espy, Michelle; Schultz, Larry; Hunter, James

2013-11-25T23:59:59.000Z

273

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

274

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

275

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

276

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

277

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

278

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

279

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

280

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

World Institute for Nuclear Security Launch | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

World Institute for Nuclear Security Launch World Institute for Nuclear Security Launch World Institute for Nuclear Security Launch September 29, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you. My thanks to Director General El Baradei and Senator Nunn for their opening remarks. I am pleased to be here with you this afternoon. Each nation has the responsibility to assist in the effort to make nuclear materials and facilities secure. This means we need cooperation at every level and every stage of the process: from government, to industry, to non-governmental organizations. As such, the World Institute for Nuclear Security will make an important contribution to the cause of nuclear nonproliferation and nuclear security. By bringing the private, public, and non-governmental sectors together,

282

World Institute for Nuclear Security Launch | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Institute for Nuclear Security Launch Institute for Nuclear Security Launch World Institute for Nuclear Security Launch September 29, 2008 - 3:43pm Addthis Remarks as Prepared for Secretary Bodman Thank you. My thanks to Director General El Baradei and Senator Nunn for their opening remarks. I am pleased to be here with you this afternoon. Each nation has the responsibility to assist in the effort to make nuclear materials and facilities secure. This means we need cooperation at every level and every stage of the process: from government, to industry, to non-governmental organizations. As such, the World Institute for Nuclear Security will make an important contribution to the cause of nuclear nonproliferation and nuclear security. By bringing the private, public, and non-governmental sectors together,

283

Secure Transportation_final_print-ready  

Broader source: Energy.gov (indexed) [DOE]

A A History of Secure Transportation * The transportation of the CEUSP material in casks will be made by Hittman Transport, a commercial carrier * Hittman Transport is a specialty company whose primary mission is transporting hazardous materials * Transport method meets all of the requirements of the Department of Energy, Nuclear Regulatory Commission, and Department of Transportation for shipment of hazardous radioactive material * Hittman Transport maintains drivers with DOE security clearances and all shipments will be escorted by armed Federal officers Hittman Transport drivers' average number of years experience 26 Completed Hittman Transport shipments without significant accident or loss of material 196K Hittman Transport began supporting the nuclear industry

284

Related Sites | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Related Sites Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. B&W Corporate B&W Corporate The Babcock & Wilcox Company is a leading international provider of energy products and services. B&W Lawrence Livermore Lawrence Livermore National Laboratory helps reduce and counter threats to national and global security through the advancement and application of science and technology. B&W Pantex Located in Amarillo, Texas, the Pantex Plant supports stockpile stewardship, nonproliferation, and safeguards and security. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor

285

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

286

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z

287

Transmission Line Security Monitor: Final Report  

SciTech Connect (OSTI)

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

288

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

289

Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

290

Rationale and Development of a Security Assurance Index with Application toward the Development of a World Risk Index  

SciTech Connect (OSTI)

Assurance categories were previously developed to support the Department of Homeland Securitys efforts in the mitigation of Cyber Control System events. Defined according to the risk of life and economic loss, the minimum range is designated by policy, whereas the maximum limit seems to be constrained only by limits and interdependencies of the event. Use of this life / assets scale has proven to be helpful in managing risk due to the scale's ease of use, communication, and understanding. Suggestions have been made that this scale could be applied to all events of terror, disaster, and calamity of an international scale, with equally good results. This paper presents the history of some existing scales of disaster and assurance, the rationale behind the development of the original Security Assurance Index, and our proposed scale of disaster and calamity as a World Risk Index.

M. M. Plum; G. A. Beitel, PhD

2006-06-01T23:59:59.000Z

291

Deputy Assistant Secretary Jack Surash's Written Statement before the Subcommittee on Financial and Contracting Oversight Committee on Homeland Security and Governmental Affairs (June 27, 2013)  

Broader source: Energy.gov [DOE]

Written Statement of Jack Surash, Deputy Assistant Secretary for Acquisition and Project Management of Office of Environmental Management, United States Department of Energy, before the...

292

Large-Area Plasma-Panel Radiation Detectors for Nuclear Medicine Imaging to Homeland Security and the Super Large Hadron Collider  

E-Print Network [OSTI]

A new radiation sensor derived from plasma panel display technology is introduced. It has the capability to detect ionizing and non-ionizing radiation over a wide energy range and the potential for use in many applications. The principle of operation is described and some early results presented.

Friedman, Peter S; Chapman, J Wehrley; Levin, Daniel S; Weaverdyck, Curtis; Zhou, Bing; Benhammou, Yan; Etzion, Erez; Moshe, M Ben; Silver, Yiftah; Beene, James R; Varner, Robert L

2010-01-01T23:59:59.000Z

293

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

294

Industrial Radiology  

Science Journals Connector (OSTI)

... chief application of industrial radiology in Norway is in the examination of pipe welds in hydroelectric plant. H. Vinter (Denmark), director of the Akademiet for de Technische Videns ... and to compare various methods of non-destructive testing. He gave results of tests on turbine disk forgings of austenitic steel which showed satisfactory agreement between radiography, ultrasonic examination and ...

1950-11-18T23:59:59.000Z

295

Safeguards and Security and Cyber Security RM  

Broader source: Energy.gov (indexed) [DOE]

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

296

Space security through the transatlantic partnership  

Science Journals Connector (OSTI)

On 1214 June 2011, a conference was convened in Prague entitled Space Security through the Transatlantic Partnership, co-sponsored by the European Space Policy Institute (ESPI) and the Prague Security Studies Institute (PSSI). It was the first non-governmental transatlantic conference of its kind dedicated to this topic, attended by over 100 senior space policy officials and high-level representatives of multilateral institutions, NGOs, academia, and industry from Europe, the USA, and Japan. The overarching goal of the conference was to solicit and assess both converging and diverging views on the multifaceted subject of space security and to seek to establish an on-going Track II non-governmental process designed to assist with the crafting of a future architecture for the management of this key dimension of space policy on a trilateral, and eventually global, basis. This report summarizes the proceedings.

Jana Robinson

2012-01-01T23:59:59.000Z

297

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Broader source: Energy.gov (indexed) [DOE]

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

298

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

299

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

300

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

SECURITY TERMINATION STATEMENT | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

302

Office of Security Operations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

303

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

304

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

305

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

306

Security Topic Group  

Broader source: Energy.gov (indexed) [DOE]

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

307

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

308

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

309

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

310

Office of Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

311

Safeguards and Security Program - DOE Directives, Delegations...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

312

Office of Security Enforcement | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

313

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

314

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

315

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

316

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

317

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

318

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Broader source: Energy.gov (indexed) [DOE]

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

319

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

320

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Integrity, Reliability and Security: The Role of Technology  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

F. Lawson F. Lawson Director, Strategic Center for Natural Gas & Oil National Energy Technology Laboratory General session Natural Gas Technologies Conference 2005 Cosponsors: NETL/Gas Technology Institute Orlando, Florida January 31, 2005 Integrity, Reliability and Security: The Role of Technology Introduction Integrity, reliability, and security encompass all the attributes we want-indeed, need-from our natural gas industry. We need integrity in physical transportation and storage systems, reliability in operating systems, and security in supplies and delivery systems. This conference is the most comprehensive forum for addressing new and evolving technologies impacting all these needs. The conference scope runs the gamut: from finding and producing to storing,

322

U.S. Industrial Energy Efficiency Programs  

Broader source: Energy.gov (indexed) [DOE]

Second U.S.-China Second U.S.-China Energy Efficiency Forum May 6, 2011 James Quinn Energy Efficiency & Renewable Energy U.S. Department of Energy U.S. Industrial Energy Efficiency Programs 2 | Industrial Energy Efficiency eere.energy.gov Global Energy Challenges Energy efficiency and renewable energy provide solutions to global energy challenges. Security Environment Economy Clean Energy Solutions Overarching Challenges: * Carbon reduction * Market delivery of clean energy technologies * Research and development needs * Economic growth * Workforce development 3 | Industrial Energy Efficiency eere.energy.gov U.S. industry accounts for about one-third of all U.S. energy consumption. Petroleum Natural Gas Electricity* Coal and Coke Renewable Energy Residential 21.8% Industry 31.4% Commercial

323

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

324

Audit Report: IG-0775  

Broader source: Energy.gov [DOE]

National Nuclear Security Administration's Construction of aRadiological/Nuclear Complex for Homeland Security

325

Nonproportionality of Scintillator Detectors: Theory and Experiment  

E-Print Network [OSTI]

part by the National Nuclear Security Administration, Officeof Homeland Security, Domestic Nuclear Detection Office and

Moses, William

2010-01-01T23:59:59.000Z

326

Coaxial Mono-Energetic Gamma Generator for Active Interrogation  

E-Print Network [OSTI]

of Energy's National Nuclear Security Administration underof Homeland Security, Domestic Nuclear Detection Office

Ludewigt, Bernhard A.

2010-01-01T23:59:59.000Z

327

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

328

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

329

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

330

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

331

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

332

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

333

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

334

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

335

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

336

Office of Security Operations: Headquarters Security Officers (HSO) Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

337

Detecting and Mitigating Security Risks  

E-Print Network [OSTI]

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

338

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

339

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

340

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

342

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

343

Security Suites | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

344

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

345

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

346

Gray, W. D. (2003). Cognitive factors in homeland defense: The role of human factors in the novel intelligence from massive data (NIMD) project, Human Factors and Ergonomics Society (pp. 1017-1018). Santa Monica, CA: Human  

E-Print Network [OSTI]

intelligence from massive data (NIMD) project, Human Factors and Ergonomics Society (pp. 1017-1018). Santa Monica, CA: Human Factors and Ergonomics Society. COGNITIVE FACTORS IN HOMELAND DEFENSE: THE ROLE

Gray, Wayne

347

Mechanical & Industrial Engineering  

E-Print Network [OSTI]

Mechanical & Industrial Engineering 1 Welcome MIE Industrial Advisory Board October 15, 2010 #12;Mechanical & Industrial Engineering 2 MIE Dorothy Adams Undergraduate/Graduate Secretary David Schmidt Associate Professor & Graduate Program Director #12;Mechanical & Industrial Engineering 3 MIE James Rinderle

Mountziaris, T. J.

348

Industry Perspective  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

idatech.com idatech.com info@idatech.com 63065 NE 18 th Street Bend, OR 97701 541.383.3390 Industry Perspective Biogas and Fuel Cell Workshop National Renewable Energy Laboratory June 11 - 13, 2012 Mike Hicks Chairman of the Board of Directors, FCHEA Treasurer of the Board of Directors, FCS&E Engineering Manager, Technology Development & Integration, IdaTech Outline 1. Critical Factors * Fuel Purity * Fuel Cost 2. Natural Gas - The Wild Card & Competition 3. IdaTech's Experience Implementing Biofuel Critical Factor - Fuel Purity All fuel cell system OEMs have fuel purity specifications * Independent of * Raw materials or feed stocks * Manufacturing process * Depends on * Fuel processor technology * Fuel cell technology - low temp PEM versus SOFC

349

Cloud Service Security Requirements Questionnaire 1. What Cloud service will you be providing  

E-Print Network [OSTI]

Cloud Service Security Requirements Questionnaire Exhibit G 1. What Cloud service will you) as Low/Moderate/High? If so, which? 4. Has your cloud service been audited by any eternal agencies for security and quality control? If so, please provide evidence. 5. Has your cloud service been industry

350

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

351

Engineering Industrial & Systems  

E-Print Network [OSTI]

Industrial Engineering Department of Industrial & Systems Engineering Leslie Monplaisir, Ph powerful tool sets used in industry today. -Brent Gillett, BSIE 2007 Advanced Planning Engineer at BMW I is available at: http://ise.wayne.edu/bs-industrial/index What is Industrial Engineering? The industrial

Berdichevsky, Victor

352

INDUSTRIAL ENGINEERING Industrial engineering is concerned  

E-Print Network [OSTI]

INDUSTRIAL ENGINEERING Industrial engineering is concerned with looking at the "big picture" of systems that allow organizations and individuals to perform at their best. Industrial engineers bridge should be used and how they should be used. Industrial engineers design and run the factories and systems

353

INDUSTRIAL ENGINEERING Industrial engineering is concerned  

E-Print Network [OSTI]

INDUSTRIAL ENGINEERING Industrial engineering is concerned with looking at the "big picture" of systems that allow organizations and individuals to perform at their best. Industrial engineers bridge should be used and how they should be used. The focus of industrial engineering is on process improvement

354

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

355

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

356

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

357

Information Security: Coordination of Federal Cyber Security Research and  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

358

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

359

Headquarters Security Quick Reference Book  

Broader source: Energy.gov [DOE]

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

360

November 2003 NETWORK SECURITY TESTING  

E-Print Network [OSTI]

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

362

National Security, Weapons Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

363

Requirements for security signalling  

SciTech Connect (OSTI)

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

364

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

365

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

366

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

367

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

368

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

369

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

370

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

371

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

372

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

373

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

374

This Thursday: Google+ Hangout on Securing the Smart Grid | Department of  

Broader source: Energy.gov (indexed) [DOE]

This Thursday: Google+ Hangout on Securing the Smart Grid This Thursday: Google+ Hangout on Securing the Smart Grid This Thursday: Google+ Hangout on Securing the Smart Grid May 14, 2013 - 1:54pm Addthis April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs Sign up at the Google+ Event page. Tweet questions to @ENERGY with the hashtag #AskEnergy. Ask us on Facebook and Google+. Email questions to newmedia@hq.doe.gov. Happening now on energy.gov/live Join us this Thursday, May 16 at 2:00pm EDT for a Google+ Hangout on Securing the Smart Grid. Panelists from across the power systems industry will discuss a critical element of a secure and resilient electric power system, the smart grid cybersecurity workforce. Grid security professionals are the workers at the core of a secure and resilient national electric system. As part of the Energy Department's

375

Principal Associate Director - Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

376

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

377

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

378

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

379

National Preparedness Goal, Execution, and Performance  

E-Print Network [OSTI]

including Homeland Security Affairs, Journal of Homeland Security and Emergency Management, Public Administration Review, Security Affairs, and Journal of Homeland Security; (6) preparedness observations from major think tanks studying homeland security... administration journals including The Journal of Homeland Security and Emergency Management and Homeland Security Affairs; (2) public media sources including newspaper articles, TV/radio reports and online news domains; and (3) insights from products produced...

Alexander, Michael; Carrington, Clement; Erxleben, Whitney; Garcia, Edgar; Grandstaff, Kathryn; Meehan, Elisabeth; Morales, Lyndsey; Nyquist, David; Taylor, Lindsay

2009-01-01T23:59:59.000Z

380

Incidents of Security Concern  

Broader source: Energy.gov (indexed) [DOE]

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

382

Mfg & Tech Services | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mfg & Tech Services Mfg & Tech Services Mfg & Tech Services Y-12 possesses unique manufacturing and technical service resources. Y-12 serves the nation's national security mission as an enduring national asset, providing leadership in manufacturing and technical services for NNSA's nuclear security enterprise, other government agencies, and U.S. industry. National security challenges are met by leveraging Y-12's capabilities, subject matter expertise, and industrial and academic partnerships that have been developed as an NSE asset in alignment with our M&TS core competency. Y-12 possesses unique manufacturing and technical service resources that: Solve high-risk challenges and eliminate the most difficult manufacturability and development obstacles; Protect classified and proprietary materials, components and

383

Control Systems Security News Archive | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News Archive News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award October 2009 - DOE NSTB researchers demonstrated R&D successes to asset owners at EnergySec Conference September 2009 - ISA approves standard for wireless automation in process control applications Sept. 2009 - Government and Industry a Force for Collaboration at the

384

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

385

Roadmap to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

386

Environment/Health/Safety/Security (EHSS): Industrial Hygiene Group Members  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Do not enter signage Confined Space Program meter image Confined spaces are difficult to enter and exit, and are generally not designed for continuous human occupancy. When a confined space contains a hazard, they can be extremely dangerous. Every year there are a number of fatalities that occur from confined space accidents, and often this includes someone who was just trying to help rescue a coworker. Examples of confined spaces at the LBNL include round manholes, vaults, research vessels, tanks and ducts. The Confined Space Inventory provides a guide to these spaces. The LBNL procedures that must be followed to ensure your safety are in Chapter 34 of PUB 3000. If you, or a coworker, must enter a space that might be a confined space, become familiar with the LBNL procedures that are in place to protect your

387

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

388

DOE Announces Awardees for the Industrial Energy Efficiency Grand Challenge  

Broader source: Energy.gov (indexed) [DOE]

Awardees for the Industrial Energy Efficiency Grand Awardees for the Industrial Energy Efficiency Grand Challenge DOE Announces Awardees for the Industrial Energy Efficiency Grand Challenge May 5, 2010 - 12:00am Addthis WASHINGTON, DC - The U.S. Department of Energy announced today that 48 research and development projects across the country have been selected as award winners of the Industrial Energy Efficiency Grand Challenge. The grantees will receive a total of $13 million to fund the development of transformational industrial processes and technologies that can significantly reduce greenhouse gas emissions throughout the industrial sector. The funding will be matched by more than $5 million in private industry funding to support a total of $18 million in projects that will enhance America's energy security and strengthen our economy.

389

DOE Announces Awardees for the Industrial Energy Efficiency Grand Challenge  

Broader source: Energy.gov (indexed) [DOE]

Awardees for the Industrial Energy Efficiency Grand Awardees for the Industrial Energy Efficiency Grand Challenge DOE Announces Awardees for the Industrial Energy Efficiency Grand Challenge May 5, 2010 - 12:00am Addthis WASHINGTON, DC - The U.S. Department of Energy announced today that 48 research and development projects across the country have been selected as award winners of the Industrial Energy Efficiency Grand Challenge. The grantees will receive a total of $13 million to fund the development of transformational industrial processes and technologies that can significantly reduce greenhouse gas emissions throughout the industrial sector. The funding will be matched by more than $5 million in private industry funding to support a total of $18 million in projects that will enhance America's energy security and strengthen our economy.

390

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

391

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

392

High Fermentable Corn Hybrids for the Dry-Grind Corn Ethanol Industry  

Science Journals Connector (OSTI)

The biofuel corn ethanol helps provide a sustainable and secure non-petroleum source of energy. The dry-grind ethanol industry is the ... customer for about one-third of US-produced corn grain. Getting the most e...

Joel E. Ream; Ping Feng; Iigo Ibarra

2010-01-01T23:59:59.000Z

393

Urban agriculture as a tool for neighborhood fabric repair in post-industrial Detroit  

E-Print Network [OSTI]

This thesis focuses on Detroit as a post-industrial city that suffers from abandonment, vacancy, and food security issues. I address this problem through the lens of agriculture, asking how urban farming can be used to ...

Fairbank, Sandra Trubow

2011-01-01T23:59:59.000Z

394

Applying Service Oriented Architecture in the Aerospace Industry Jurga Kazlauskaite, Arsalan Minhas, F. H. Vogt  

E-Print Network [OSTI]

1 Applying Service Oriented Architecture in the Aerospace Industry Jurga Kazlauskaite, Arsalan efficiently working Service Oriented Architecture for cross enterprise business processes and stresses. Key words: Service Oriented Architecture, cross enterprise business processes, verification, security

Turau, Volker

395

South Korean technology policies for the industrial competitiveness between Japan and China  

E-Print Network [OSTI]

(cont.) In addition, this paper will propose new technology policies for Korea in order to secure its position as a leader in the information technology (IT) industry, particularly in the context of its relationships with ...

Lee, Sanghoon, S.M. Massachusetts Institute of Technology, Dept. of Urban Studies and Planning

2006-01-01T23:59:59.000Z

396

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

397

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

398

Sandia National Laboratories: Water Security Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

399

Integrated safeguards and security management plan  

E-Print Network [OSTI]

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

400

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network [OSTI]

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

402

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

403

Security, Emergency Planning & Safety Records | Department of...  

Broader source: Energy.gov (indexed) [DOE]

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

404

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

405

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

406

and Industrial Engineering  

E-Print Network [OSTI]

45 Mechanical and Industrial Engineering 220 Engineering Lab Degrees: Bachelor of Science in Mechanical Engineering Bachelor of Science in Industrial Engineering Contact: James R. Rinderle to prosthetic limbs to windmills, and their myriad components. Industrial engineers are concerned

Mountziaris, T. J.

407

Industrial and Systems engineering  

E-Print Network [OSTI]

Industrial and Systems engineering COLLEGE of ENGINEERING DepartmentofIndustrialandSystemsEngineering EDGE Engineering Entrepreneur Certificate Program is a great addition to an industrial and systems to expert clinical recommendations. engineering.wayne.edu/isefaculty Industrial and systems engineering

Berdichevsky, Victor

408

Commentary on industrial processes  

Science Journals Connector (OSTI)

...crucial for an industrial process, namely: catalyst activity...of catalysis to industrial processes. The papers, however, do...at the heart of successful commercialization of catalytic science and technology...addressed in any industrial process, namely: activity-the...

2005-01-01T23:59:59.000Z

409

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

410

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

411

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

412

Security Clearances; Limitations  

Broader source: Energy.gov (indexed) [DOE]

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

413

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

414

The security fallacy: Seven myths about physical security | Argonne  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

415

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

416

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

417

Uranium industry annual 1997  

SciTech Connect (OSTI)

This report provides statistical data on the U.S. uranium industry`s activities relating to uranium raw materials and uranium marketing.

NONE

1998-04-01T23:59:59.000Z

418

Protecting Finnish defence security: a logistics challenge  

Science Journals Connector (OSTI)

This study examines how Finland can secure efficient logistics for the use of their military forces. In doing so, it examines how logistics service providers (LSPs) in countries with higher cost structures can maintain their profitability when competing against transport companies in countries with lower cost structures. The empirical data was gathered from Finnish LSPs in 2008. The survey resulted in 460 acceptable responses. The research models were tested with structural equation modelling (SEM). The results suggest that LSPs can not increase their profits with their negotiation power. However, a positive image of the industry seems to facilitate profitability. In addition, contracts seem to facilitate the profitability of the LSPs, but only if those are accurate and updated. As a conclusion, in addition to negotiation power and contracts, the image of the industry is found to be important as well when LSPs want to increase their profits.

J. Juntunen; M. Juntunen; V. Autere

2011-01-01T23:59:59.000Z

419

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

420

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Engineering secure software  

E-Print Network [OSTI]

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

422

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

423

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

424

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network [OSTI]

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

425

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

426

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

427

Industrial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

2 2 Industrial Demand Module The NEMS Industrial Demand Module estimates energy consumption by energy source (fuels and feedstocks) for 15 manufacturing and 6 non-manufacturing industries. The manufacturing industries are further subdivided into the energy- intensive manufacturing industries and non-energy-intensive manufacturing industries (Table 6.1). The manufacturing industries are modeled through the use of a detailed process-flow or end-use accounting procedure, whereas the non- manufacturing industries are modeled with substantially less detail. The petroleum refining industry is not included in the Industrial Demand Module, as it is simulated separately in the Petroleum Market Module of NEMS. The Industrial Demand Module calculates energy consumption for the four Census Regions (see Figure 5) and disaggregates the energy consumption

428

Industrial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

This page intentionally left blank This page intentionally left blank 51 U.S. Energy Information Administration | Assumptions to the Annual Energy Outlook 2011 Industrial Demand Module The NEMS Industrial Demand Module estimates energy consumption by energy source (fuels and feedstocks) for 15 manufacturing and 6 non-manufacturing industries. The manufacturing industries are further subdivided into the energy- intensive manufacturing industries and nonenergy-intensive manufacturing industries (Table 6.1). The manufacturing industries are modeled through the use of a detailed process-flow or end-use accounting procedure, whereas the non- manufacturing industries are modeled with substantially less detail. The petroleum refining industry is not included in the Industrial Module, as it is simulated separately in the Petroleum Market Module of NEMS. The Industrial Module calculates

429

PACFEST 2004 : enabling technologies for maritime security in the Pacific region.  

SciTech Connect (OSTI)

In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

2005-06-01T23:59:59.000Z

430

National Security Science and Technology Initiative: Air Cargo Screening  

SciTech Connect (OSTI)

The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive benchmarks combinations, and conducted modeling and simulation studies to begin populating the matrix of commodities, threats, and detection technologies. (4) Designed and fabricated basic (homogeneous) commodity test pallets and fabricated inert stimulants to support experiments and to validate modeling/simulation results. (5) Developed/expanded the team's capabilities to conduct full-scale imaging (neutron and x-ray) experiments of air cargo commodities and explosive benchmarks. (6) Conducted experiments to improve the collection of trace particles of explosives from a variety of surfaces representative of air cargo materials by means of mechanical (air/vibration/pressure), thermal, and electrostatic methods. Air cargo screening is a difficult challenge that will require significant investment in both research and development to find a suitable solution to ensure the safety of passengers without significantly hindering the flow of commodities. The initiative funded by Battelle has positioned this group to make major contributions in meeting the air cargo challenge by developing collaborations, developing laboratory test systems, improving knowledge of the challenges (both technical and business) for air cargo screening, and increasing the understanding of the capabilities for current inspection methods (x-ray radiography, x-ray backscatter, etc.) and potential future inspection methods (neutron radiography, fusion of detector modalities, advanced trace detection, etc.). Lastly, air cargo screening is still an issue that will benefit from collaboration between Department of Energy Laboratories and Battelle. On January 7, 2010, DHS Secretary Napolitano joined White House Press Secretary Robert Gibbs and Assistant to the President for Counterterrorism and Homeland Security John Brennan to announce several recommendations DHS has made to the President for improving the technology and procedures used to protect air travel from acts of terrorism. (This announcement followed the 25 Dec'09 Delta/Northwest Airlines Flight 253 terror attack.) Secretary Napolitano out

Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

2010-11-01T23:59:59.000Z

431

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

432

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

433

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

434

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

435

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

436

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

437

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

438

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

439

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

440

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

442

Obama's Call for Public-Private Cyber Security Collaboration Reflected in  

Broader source: Energy.gov (indexed) [DOE]

Obama's Call for Public-Private Cyber Security Collaboration Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities Obama's Call for Public-Private Cyber Security Collaboration Reflected in DOE's Priorities May 29, 2009 - 4:08pm Addthis In releasing the results of his Administration's 60-day cyber security review, President Barack Obama today emphasized that partnering with the private sector will be paramount for agencies working to secure the power grid and other critical infrastructures from cyber attack. Securing the computer-based systems that monitor and control the nation's electric grid and oil and gas pipelines remains a shared challenge for the Department of Energy. As the industry quickly works to develop and demonstrate Smart Grid technologies to build a more reliable and resilient

443

Transmission Line Security Monitor  

SciTech Connect (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

444

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

445

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

446

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

447

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

448

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

449

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

450

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

451

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

452

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

453

Gamma Industry Processing Alliance Overview  

Broader source: Energy.gov (indexed) [DOE]

NATIONAL NATIONAL STAKEHOLDERS TRANSPORTATION FORUM WHO IS GIPA? * Alliance made up of 15 companies from the Medical Device Manufacturers, Cobalt source , manufacturers and one industrial processing company Represents all the major gamma processing * Represents all the major gamma processing facilities within the US to the regulatory bodies such as the USNRC. * Member of International Irradiation Association (iiA) WHO IS GIPA? An alliance created to advocate the development of An alliance created to advocate the development of responsible regulations that enhance the safe and secure management of Cobalt-60 sources and related irradiation processing facilities related irradiation processing facilities. APRIL 15, 2010 PRESENTATION TITLE WORLD SUPPLIERS OF COBALT 60 COBALT 60 * Nordion Inc

454

Audit Report: IG-0860 | Department of Energy  

Energy Savers [EERE]

Audit Report: IG-0860 Audit Report: IG-0860 February 28, 2012 The Department of Energy's Implementation of Homeland Security Presidential Directive 12 Homeland Security...

455

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

456

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

457

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

458

INDUSTRIAL ENGINEERING GRADUATE PROGRAMS  

E-Print Network [OSTI]

INDUSTRIAL ENGINEERING GRADUATE PROGRAMS The Master of Science in Industrial Engineering (M Systems and Engineering (M.S.M.S.E.), the Doctor of Philosophy in Industrial Engineering, and the Doctor of Philosophy in Systems and Engineering Management programs prepare competent industrial engineers

Gelfond, Michael

459

Mechanical & Industrial Engineering  

E-Print Network [OSTI]

Mechanical & Industrial Engineering 1 Welcome MIE Industrial Advisory Board May 5th, 2011 #12;Mechanical & Industrial Engineering 2 IAB 2010-2011 · David K. Anderson ­ Alden Research Laboratory, Inc went on for three weeks Mechanical & Industrial Engineering 6 #12;Reza Shahbazian Yassar Mechanical

Mountziaris, T. J.

460

Career Map: Industrial Engineer  

Broader source: Energy.gov [DOE]

The Wind Program's Career Map provides job description information for Industrial Engineer positions.

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Climate VISION: Industry Associations  

Office of Scientific and Technical Information (OSTI)

Industry Associations Industry Associations Aluminum Aluminum Association (Coordinating aluminum industry Climate VISION activities) The Aluminum Association, Inc. is the trade association for producers of primary aluminum, recyclers and semi-fabricated aluminum products, as well as suppliers to the industry. The Association provides leadership to the industry through its programs and services which aim to enhance aluminum's position in a world of proliferating materials, increase its use as the "material of choice," remove impediments to its fullest use, and assist in achieving the industry's environmental, societal, and economic objectives. Automobile Manufacturers Alliance of Automobile Manufacturers (Coordinating automobile industry Climate VISION activities) The Alliance of Automobile Manufacturers, Inc. is a trade association

462

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

463

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

464

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

465

Challenges and Opportunities for the Illinois Coal Industry  

E-Print Network [OSTI]

Challenges and Opportunities for the Illinois Coal Industry Joseph DiJohn Director Metropolitan.1.3. American Clean Energy and Security Act 7 3.2. Competition from Wind Energy 9 3.3. Expanding Export Markets 11 3.4. Mine Mouth Power Generation 11 3.5. Carbon Management Technologies 11 3.5.1. Carbon Capture

Illinois at Chicago, University of

466

Facility Security Officer Contractor Toolcart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

467

Headquarters Facilities Master Security Plan  

Broader source: Energy.gov [DOE]

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

468

Obama Administration Announces New Investments to Advance Biofuels Industry  

Broader source: Energy.gov (indexed) [DOE]

Obama Administration Announces New Investments to Advance Biofuels Obama Administration Announces New Investments to Advance Biofuels Industry and Enhance America's Energy Security Obama Administration Announces New Investments to Advance Biofuels Industry and Enhance America's Energy Security July 2, 2012 - 10:00am Addthis NEWS MEDIA CONTACT (202) 586-4940 WASHINGTON, D.C. - As part of the Obama Administration's commitment to deploying every available source of American energy and reducing our reliance on imported oil, U.S. Secretary of the Navy Ray Mabus, Secretary of Agriculture Tom Vilsack and Secretary of Energy Steven Chu announced new funding available to pursue new innovations in biofuels technologies, increase production of U.S. biofuels, and strengthen American energy security. The U.S. Department of Agriculture (USDA), Navy and Department

469

President Obama Announces Major Initiative to Spur Biofuels Industry and  

Broader source: Energy.gov (indexed) [DOE]

Major Initiative to Spur Biofuels Major Initiative to Spur Biofuels Industry and Enhance America's Energy Security President Obama Announces Major Initiative to Spur Biofuels Industry and Enhance America's Energy Security August 16, 2011 - 11:45am Addthis USDA, Department of Energy and Navy Partner to Advance Biofuels to Fuel Military and Commercial Transportation, Displace Need for Foreign Oil, and Strengthen Rural America WASHINGTON, Aug. 16, 2011 - President Obama today announced that the U.S. Departments of Agriculture, Energy and Navy will invest up to $510 million during the next three years in partnership with the private sector to produce advanced drop-in aviation and marine biofuels to power military and commercial transportation. The initiative responds to a directive from President Obama issued in March as part of his Blueprint for A Secure

470

Obama Administration Announces New Investments to Advance Biofuels Industry  

Broader source: Energy.gov (indexed) [DOE]

Obama Administration Announces New Investments to Advance Biofuels Obama Administration Announces New Investments to Advance Biofuels Industry and Enhance America's Energy Security Obama Administration Announces New Investments to Advance Biofuels Industry and Enhance America's Energy Security July 2, 2012 - 10:33am Addthis NEWS MEDIA CONTACT (202) 586-4940 WASHINGTON - As part of the Obama Administration's commitment to deploying every available source of American energy and reducing our reliance on imported oil, U.S. Secretary of the Navy Ray Mabus, Secretary of Agriculture Tom Vilsack and Secretary of Energy Steven Chu announced new funding available to pursue new innovations in biofuels technologies, increase production of U.S. biofuels, and strengthen American energy security. The U.S. Department of Agriculture (USDA), Navy and Department

471

Furthering Energy Security  

SciTech Connect (OSTI)

This fact sheet provides a general summary of the goal, programs with the U.S. Department of Energy's Solar Energy Technologies Program, and a brief overview of the solar industry.

Not Available

2008-05-01T23:59:59.000Z

472

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

473

Chapter_14_Cyber_Security  

Broader source: Energy.gov (indexed) [DOE]

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

474

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

475

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

476

Chapter_3_Personnel_Security  

Broader source: Energy.gov (indexed) [DOE]

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

477

Security Cases | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

478

Industrial Demand Module  

Gasoline and Diesel Fuel Update (EIA)

The NEMS Industrial Demand Module estimates energy consumption by energy source (fuels and The NEMS Industrial Demand Module estimates energy consumption by energy source (fuels and feedstocks) for 12 manufacturing and 6 nonmanufacturing industries. The manufacturing industries are further subdivided into the energy-intensive manufacturing industries and nonenergy-intensive manufacturing industries. The manufacturing industries are modeled through the use of a detailed process flow or end use accounting procedure, whereas the nonmanufacturing industries are modeled with substantially less detail (Table 17). The Industrial Demand Module forecasts energy consumption at the four Census region level (see Figure 5); energy consumption at the Census Division level is estimated by allocating the Census region forecast using the SEDS 27 data.

479

Security, Safety and Health  

Broader source: Energy.gov (indexed) [DOE]

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

480

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

Note: This page contains sample records for the topic "homeland security industry" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

HEADQUARTERS SECURITY OFFICERS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

482

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

483

Transforming the Oil Industry into the Energy Industry  

E-Print Network [OSTI]

SECURITY AND CLIMATE CHANGE concerns, transportation is the principal culprit. It consumes half the oil

Sperling, Daniel; Yeh, Sonia

2009-01-01T23:59:59.000Z

484

Industrial cofiring reaps big rewards  

SciTech Connect (OSTI)

US industry operates over 2,000 coal-fired stoker boilers. They are typically over 30 years old, difficult to maintain, and hard to keep in environmental compliance. Natural gas cofiring of industrial stoker boilers offers a wide range of operational benefits. Boiler efficiency is improved because combustion air requirements are reduced (low excess air of LEA) and carbon burnout is improved (loss on ignition or LOI). On the emissions side, opacity problems are reduced and NO{sub x} and SO{sub 2} emissions reduced as natural gas replaces a percentage of the coal. Further, operation is improved through easier, smoke-free start-up and warm-up, recovered steam generation, increased short-term peaking capacity, improved plant availability and improved low load operation. Fuel flexibility also increases and maintenance decreases. Cofire benefits and economics are, however, very site specific. Important factors include relative coal and gas pricing, coal and gas supply security, boiler capacity factor and seasonal use, and backup boiler capability. These factors are discussed using the example of the Dover Light and Power of Ohio.

NONE

1996-06-01T23:59:59.000Z

485

WOSMIP II- Workshop on Signatures of Medical and Industrial Isotope Production  

SciTech Connect (OSTI)

Medical and industrial fadioisotopes are fundamental tools used in science, medicine and industry with an ever expanding usage in medical practice where their availability is vital. Very sensitive environmental radionuclide monitoring networks have been developed for nuclear-security-related monitoring [particularly Comprehensive Test-Ban-Treaty (CTBT) compliance verification] and are now operational.

Matthews, Murray; Achim, Pascal; Auer, M.; Bell, Randy; Bowyer, Ted W.; Braekers, Damien; Bradley, Ed; Briyatmoko, Budi; Berglund, Helena; Camps, Johan; Carranza, Eduardo C.; Carty, Fitz; DeCaire, Richard; Deconninck, Benoit; DeGeer, Lars E.; Druce, Michael; Friese, Judah I.; Hague, Robert; Hoffman, Ian; Khrustalev, Kirill; Lucas, John C.; Mattassi, G.; Mattila, Aleski; Nava, Elisabetta; Nikkinin, Mika; Papastefanou, Constantin; Piefer, Gregory R.; Quintana, Eduardo; Ross, Ole; Rotty, Michel; Sabzian, Mohammad; Saey, Paul R.; Sameh, A. A.; Safari, M.; Schoppner, Michael; Siebert, Petra; Unger, Klaus K.; Vargas, Albert

2011-11-01T23:59:59.000Z

486

Roadmap to Secure Control Systems in the Energy: Executive Summary  

Broader source: Energy.gov (indexed) [DOE]

Foreword Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctive feature of this collaborative effort is the active involvement and leadership of energy asset owners and operators in developing the Roadmap content and priorities. The Roadmap synthesizes

487

Securing America's Future with Energy Efficient Buildings | Department of  

Broader source: Energy.gov (indexed) [DOE]

Securing America's Future with Energy Efficient Buildings Securing America's Future with Energy Efficient Buildings Securing America's Future with Energy Efficient Buildings What We Do We lead a vast network of research and industry partners to continually develop innovative, cost-effective energy saving solutions-better products, better new homes, better ways to improve older homes, and better buildings in which we work, shop, and lead our everyday lives. Why It Matters Energy efficiency is a low cost way to save money, support job growth, reduce pollution, and improve the competitiveness of our businesses. Our homes, offices, schools, hospitals, restaurants, and stores consume a lot of energy-and money. We spend more than $400 billion each year to power our homes and commercial buildings, consuming more than 70% of all

488

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

489

MIT and Energy Industries MIT Industry Brief  

E-Print Network [OSTI]

and demand, security and environmental impact. MITEI's interdisci- plinary research program focuses on: 1 of nanotechnology to solar and thermoelectric energy conversion. The mission of the MIT Photovoltaic Research synthesizes and characterizes commer- cial and next-generation photovoltaic materials and devices, engineering

Polz, Martin

490

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

491

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

492

NDLGS: Technology to enhance surveillance | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NDLGS: Technology to ... NDLGS: Technology to ... NDLGS: Technology to enhance surveillance Posted: February 11, 2013 - 2:54pm | Y-12 Report | Volume 9, Issue 2 | 2013 A new technology, created to assess gases within a weapon component without destroying the part, is expected to save taxpayers millions of dollars and to benefit multiple industries outside the Nuclear Security Enterprise. A new technology, created to assess gases within a weapon component without destroying the part, is expected to save taxpayers millions of dollars and to benefit multiple industries outside the Nuclear Security Enterprise. Scientists and engineers from Los Alamos National Laboratory, Y-12 and the Pantex Plant have collaboratively fashioned a new process to sample gases within a weapon component. This process, called the nondestructive

493

Microsoft Word - NIF Industry Day Agenda  

National Nuclear Security Administration (NNSA)

Department of Energy Department of Energy National Nuclear Security Administration Washington, DC 20585 National Nuclear Security Administration (NNSA) National Ignition Facility (NIF) Target Fabrication Industry Day at Lawrence Livermore National Laboratory (LLNL) Agenda 9:00 - 9:15 Welcome and orientation Mr. Roger Lewis, Assistant Deputy Administrator for Research, Development, Test Capabilities and Evaluation (Acting), NNSA Mr. John Post, Assistant Principal Associate Director, NIF and Photon Science, LLNL 9:15 - 9:30 Inertial Confinement Fusion (ICF) program, current and future status Mr. Roger Lewis 9:30 -10:30 National Ignition Facility (NIF), introduction and overview Mr. John Post 10:30 - 11:30 NIF/ICF Targets - Introduction, current technical requirements, anticipated future

494

EPICS - Experimental Physics and Industrial Control System  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security/Privacy Notice Security/Privacy Notice EPICS Home g+ EPICS Page on Google+ g+ Communities EPICS Users on Google+ Argonne National Laboratory Experimental Physics and Industrial Control System Home News About Base Modules Extensions Distributions Download EPICSv4 IRMIS Talk Bugs Documents Links Licensing Format page for printing Google Search Tech-talk EPICS Home Page EPICS is a set of Open Source software tools, libraries and applications developed collaboratively and used worldwide to create distributed soft real-time control systems for scientific instruments such as a particle accelerators, telescopes and other large scientific experiments. Sitemap Home: EPICS Home at APS News: Recent news Meetings: Collaboration meeting details Codeathons: Codeathon developer meetings About: What is EPICS anyway?

495

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

496

Industry 4.0  

Science Journals Connector (OSTI)

Industry is the part of an economy that produces material goods which are highly mechanized and automatized. Ever since the beginning of industrialization, technological leaps have led to paradigm shifts which to...

Dr. Heiner Lasi

2014-08-01T23:59:59.000Z

497

Chemistry Industry in Egypt  

Science Journals Connector (OSTI)

Chemistry Industry in Egypt ... FROM antiquity the Egyptian economy has been predominately agricultural. ... Nevertheless, it is most probable that the ancient Egyptians were the world's first practical or industrial chemists. ...

1953-08-10T23:59:59.000Z

498

INDUSTRIAL ENGINEER APPRENTICE OPPORTUNITY  

E-Print Network [OSTI]

INDUSTRIAL ENGINEER APPRENTICE OPPORTUNITY SUMMER 2013 Industrial Engineering COOP Student needed-Fri, for summer 2013. Student must be enrolled in BS Engineering program. (Preferably completed 2-3 yrs

Pohl, Karsten

499

Industrial Green | Jefferson Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Green Industrial Green - This giant bag may not look green, but it keeps a potent greenhouse gas from being released into the atmosphere. It's part of a system at the...

500

The Industrial Electrification Program  

E-Print Network [OSTI]

EPRI's role as the research organization of the electric power industry, in coordination with potential user industries, is to 1) define the viability of candidate electrification technologies by monitoring the state-of-the-art and continuously...

Harry, I. L.

1982-01-01T23:59:59.000Z