National Library of Energy BETA

Sample records for introduction scada security

  1. Introduction SCADA Security for Managers and Operators | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber ...

  2. Cyber Assessment Methods for SCADA Security

    Energy Savers [EERE]

    INTRODUCTION The National SCADA Test Bed (NSTB) program is sponsored by the Department of ... The Idaho National Laboratory (INL) SCADA Test Bed is a venue for assessing the security ...

  3. Framework for SCADA Security Policy

    Energy Savers [EERE]

    Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear

  4. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  5. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  7. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  8. Framework for SCADA Security Policy (October 2005) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy

  9. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with...

    Energy Savers [EERE]

    SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August ... Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston ...

  10. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system ...

  11. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. PDF icon Lessons Learned from Cyber

  12. Secure SCADA Communication ProtocolPerformance Test Results

    Broader source: Energy.gov [DOE]

    The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory...

  13. Hallmark Project Commercialization of the Secure SCADA Communications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol, a cryptographic security solution for device-to-device communication | Department of Energy Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy

  14. Cyber Assessment Methods for SCADA Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  15. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  16. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  17. Introduction There

    Office of Environmental Management (EM)

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector PDF icon Introduction SCADA Security for Managers and Operators More Documents & Publications Intermediate SCADA Security Training Course Slides

  18. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  19. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  20. Intermediate SCADA Security Training Course Slides (September 2006)

    Broader source: Energy.gov [DOE]

    Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to...

  1. National SCADA Test Bed - Enhancing control systems security in the energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    sector (September 2009) | Department of Energy SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA)

  2. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems,

  3. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Energy Savers [EERE]

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  4. 21 Steps to Improve Cyber Security of SCADA Networks | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supervisory control and data acquisition (SCADA) networks contain computers and ... By allowing the collection and analysis of data and control of equipment such as pumps and ...

  5. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  6. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  7. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  8. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric...

  9. National SCADA Test Bed Fact Sheet

    Office of Environmental Management (EM)

    their systems in an operational environment and test or verify security upgrades prior to installation. The National SCADA Test Bed Program is a national resource to help secure ...

  10. SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... How to Partner Small Business Vouchers Pilot at ... Before SCADA, "you had to send people around the plants to ... operational systems in hydroelectric dams; water treatment ...

  11. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... SCADA Images Since 1999, Sandia has conducted numerous assessments of SCADA and process control systems in hydroelectric dams; water treatment systems; electric power transmission, ...

  12. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  13. "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vol 7 No 8 | Department of Energy "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications,

  14. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Testbeds - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  15. Roadmap to Secure Control Systems in the Energy Sector

    Energy Savers [EERE]

    ... World market study of SCADA, energy management systems and ... SCADA systems security measures: Current adoption and usage ... August 2005. www.infragard.netlibrarycongress05...

  16. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure,

  17. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to make decisions as well as human support to maintain the information system. In other words, they were expensive. At the same time, SCADA systems were not as expensive as...

  18. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supervisory Control and Data Acquisition (SCADA) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste

  19. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nations energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INLs research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate non-normal traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  20. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energys Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OEs Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  1. U.S. DOE/OE National SCADA Test Bed Supports | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) efforts to enhance control system security in the energy sector, DOE's Office of Electricity ...

  2. Production Facility SCADA Design Report

    SciTech Connect (OSTI)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.; Woloshun, Keith Albert; Wheat, Robert Mitchell Jr.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  3. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  4. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and...

  5. A Nuclear Family: Extras - Introduction | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... A Nuclear Family: Extras - Introduction The mp4 video format is not supported by this browser. Download video Captions: On Time: 6:59 min. D. Ray Smith, Y-12 historian, provides an introduction to the series

  6. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy ... Hydrogen Infrastructure Hydrogen Production Market Transformation Fuel Cells ...

  7. Introduction to SCADA Protection and Vulnerabilities (Technical...

    Office of Scientific and Technical Information (OSTI)

    large electric utility still owns power generation facilities, power transmission and ... of the system occurs at the nodes of the grid, the generation facilities, and substations. ...

  8. Introduction to SCADA Protection and Vulnerabilities

    SciTech Connect (OSTI)

    Ken Barnes; Briam Johnson; Reva Nickelson

    2004-03-01

    Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utility’s grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

  9. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  10. Review of Supervisory Control and Data Acquisition (SCADA) Systems...

    Office of Scientific and Technical Information (OSTI)

    Review of Supervisory Control and Data Acquisition (SCADA) Systems Citation Details In-Document Search Title: Review of Supervisory Control and Data Acquisition (SCADA) Systems ...

  11. National SCADA Test Bed Substation Automation Evaluation Report...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation ...

  12. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 ...

  13. National SCADA Test Bed | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity » Energy Delivery Systems Cybersecurity » National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems. Core and Frontier Research The NSTB core capabilities combine a

  14. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  15. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear

  16. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  17. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  18. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  19. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  20. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... applied to SCADA, to cryptographic security, system ... Integration is key to exploiting nanomaterials, and the ... storage, and load management at the component and ...

  1. Cyber Security Procurement Language for Control Systems Version...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process ...

  2. Introduction

    Office of Environmental Management (EM)

    Introduction After the Office of Environmental Management (EM) completes environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers...

  3. Introduction

    National Nuclear Security Administration (NNSA)

    ... two gun turrets at either end of the facility provide extended security at the DAF. environmental testing and the other for observing operations in an adjacent assembly cell. ...

  4. INTRODUCTION

    Office of Scientific and Technical Information (OSTI)

    OF MISSOURI PRINCIPAL INVESTIGATOR: STEPHEN G. PALLARDY 2 INTRODUCTION We received funding ... even further compared to 2005 (320 g m -2 yr -1 in 2006 vs. 457 g m -2 yr -1 in 2005). ...

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For more than 50 years, the Nevada Test Site, now known at the Nevada National Security ... Tory II-B never got beyond the drawing board, but three years after Tory IIA-I, Tory- II-C ...

  6. Introduction

    National Nuclear Security Administration (NNSA)

    January 2011 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas,...

  7. Introduction

    National Nuclear Security Administration (NNSA)

    March 2010 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas,...

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nonproliferation Test and Evaluation Complex (NPTEC) is the world's largest facility for open air testing of hazardous toxic materials and biological simulants. It is located at the Nevada National Security Site on Frenchman Flat, a natural geological basin approximately 75 miles northwest of Las Vegas. The topography, wind predictability, and location provide a secure, controlled environment for small and large-scale testing, which is governed by an approved Environmental Assessment. An

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Criticality Experiments Research Center (NCERC) is located at the Nevada National Security Site (NNSS) and operated by Los Alamos National Laboratory (LANL). NCERC maintains a substantial special nuclear material (SNM) inventory and expertise to support a variety of nuclear security missions, including nuclear criticality safety research and training, nuclear emergency response, nuclear nonproliferation, and support for other Government Agencies that require hands-on access to

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic age that not only affected national security, but national culture as well. Today it is known as the Nevada National Security Site (NNSS). Testing Captures America's Attention The Ranger test

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic testing age that not only affected national security, but national culture as well. Today it is called the Nevada National Security Site (NNSS). The Ranger test series At the commencement of

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prehistoric cultural resources are abundant on the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), indicating Native Americans occupied the region for more than 10,000 years. Historic artifacts from the late nineteenth and early twentieth centuries are also present, reflecting use by miners, ranchers, and settlers who traveled through the area. The U.S. Department of Energy National Nuclear Security Administration Nevada Field Office (NNSA/NFO) is committed to

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    To increase the domestic preparedness to combat terrorist threats, the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Offce (NNSA/NFO) provides a unique radiological/nuclear weapons of mass destruction (WMD) training center at the Nevada National Security Site (NNSS), located 65 miles northwest of Las Vegas, Nevada. At the NNSS, emergency responders are trained to take immediate, decisive actions in response to terrorist use of radiological or nuclear WMDs, such

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    do Ruth, Dixie, Shasta, Butternut, Seersucker, and Mink all have in common? They were all names of nuclear tests conducted at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS), between 1951 and 1962. A total of 928 atmospheric and underground nuclear tests was conducted at the NTS, and each of those tests was christened with a name. Background Beginning with Trinity, the first atomic test in 1945, nuclear tests were all assigned code names as a security measure

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    52 feet tall, it remains a well-known, highly visible landmark at the Nevada National Security Site (NNSS). It is the modular tower built for Icecap, a joint United Kingdom, Los Alamos National Laboratory underground nuclear test scheduled for the spring of 1993. What was scheduled to be the 929th test came to a halt when President Bush signed the Underground Nuclear Testing Moratorium on October 3, 1992. The tower still remains in Area 7 of the Nevada National Security Site. The Icecap tower

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Starting in 1951, thousands of military personnel from all four U.S. military services received orders to serve with the U.S. Army's Atomic Maneuver Battalion working at Camp Desert Rock at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). A Step Back in Time It is hard to imagine that in the 1950s the Nevada National Security Site host- ed a bustling military camp full of young soldiers, marines, sailors and airmen who were to witness the heat and blast of the

  17. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information ...

  18. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  19. Advanced Supervisory Control and Data Acquisition (SCADA) for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supervisory Control and Data Acquisition (SCADA) for Biochemical Process Integration 226... biomass feedstocks * The Importance: A robust fleet of biorefineries will support a ...

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    x Introduction April 1, 2011 - March 31, 2012 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2011 through March 31, 2012. The format follows that of previous years. Sections I through IV contain reports from individual research projects. Operation and technical developments are given in Section V. Section VI lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ix Introduction April 1, 2012 - March 31, 2013 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2012 through March 31, 2013. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    xi Introduction April 1, 2013 - March 31, 2014 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2013 through March 31, 2014. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and outside users and the Appendix gives

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to the Open Source PV LIB for Python Photovoltaic System Modelling Package Robert W. Andrews 1 , Joshua S. Stein 2 , Clifford Hansen 2 , and Daniel Riley 2 1 Calama Consulting, Toronto, Ontario, M5T1B3, Canada 2 Sandia National Laboratories, Albuquerque, NM, 87185, USA Abstract-The proper modeling of Photovoltaic(PV) systems is critical for their financing, design, and operation. PV LIB provides a flexible toolbox to perform advanced data analysis and research into the performance

  4. Introduction

    Office of Environmental Management (EM)

    1 Introduction Advances in manufacturing technologies, including modular construction, improved factory and field fabrication and other innovative construction technologies, are essential to the future of nuclear energy. They are strategically important to the economics of new nuclear power plant construction in the United States and to the competitiveness of the U.S. in the nuclear energy market. In 2012, the Nuclear Energy Enabling Technologies (NEET) Program was initiated by the Department of

  5. Introduction

    Office of Environmental Management (EM)

    Introduction Instrumentation and controls are used in commercial nuclear energy and fuel cycle systems to measure important system parameters, provide control input to components that maintain systems within desired and safe limits, and provide owners and operators with the needed awareness of plant conditions to plan and safely manage operational evolutions. In a sense, instrumentation and control (I&C) systems function as the nervous system of a nuclear power plant and other nuclear

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Construction began on the Device Assembly Facility (DAF) in the mid-1980s to support underground nuclear testing. DAF was designed and built to consolidate all nuclear explosive assembly functions, to provide safe structures for high explosive and nuclear explosive assembly operations, and to provide a state-of-the-art safeguards and security environment. Now that the United States is under a continuing nuclear testing moratorium, the DAF now provides support for Stockpile Stewardship

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1992, the President of the United States placed a moratorium on underground nuclear weapons testing. As a result, alternate experimental methods for certifying the nation's nuclear weapons stockpile were implemented. Among these experimental methods was the Joint Actinide Shock Physics Experimental Research (JASPER) Facility, located at the Nevada National Security Site. JASPER plays an integral role in the certification of the nation's nuclear weapons stockpile by provid- ing a method to

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U1a facility is an underground laboratory used for subcritical experiments; physics experiments that are used to obtain technical information about the U.S. nuclear weapons stockpile. These experiments support the U.S. Department of Energy, National Nuclear Security Administration's (NNSA) Stockpile Stewardship Programs, created to maintain the safety and reliability of the U.S. nuclear weapons stockpile. The U1a borehole was originally excavated in the 1960s for an underground nuclear test that

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Big Explosives Experimental Facility (BEEF) is a hydrodynamic testing facility, located at the Nevada National Security Site (NNSS), about 65 miles northwest of Las Vegas. BEEF provides data, through explosive experiments, to support the Stockpile Stewardship Program, along with a variety of new experimental programs that expand the nation's non-nuclear experiment capabilities. History When the U.S. Department of Energy's Lawrence Livermore National Laboratory (LLNL) facility in Livermore,

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mid-1950s the United States launched a nuclear rocket program called Project Rover. The Atomic Energy Commission (AEC) and the National Aeronautics and Space Administration's (NASA) Space Nuclear Propulsion Office jointly administered the test area, later called the Nuclear Rocket Development Station (NRDS) in Area 25 of the Nevada Test Site (now known as the Nevada National Security Site (NNSS)). NRDS was a sprawling complex composed of test cells and assembly buildings. Connecting these

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Between 1951 and 1992, 828 underground nuclear tests were conducted in specially drilled vertical holes, vertical shafts, and horizontal tunnels at the Nevada Test Site, now known as the Nevada National Security Site (NNSS). Most vertical shaft tests assisted in the development of new weapon systems. Horizontal tunnel tests occurred to evaluate the effects (radiation, ground shock) of various weapons on military hardware and systems. Background Between 1951 and 1963, a total of 100 atmospheric

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Since the beginning of the industrial revolution the amount of carbon dioxide (CO 2 ) in the atmosphere has risen sharply and has the potential to dramatically affect global climate. It is important to determine how deserts and semiarid lands, which comprise nearly 40 percent of the Earth's land mass, will respond to the effects of this increase in CO 2 and related climate change. Collaborative ecological studies are being conducted at the Nevada National Security Site (NNSS), formerly known as

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    work at the Nevada National Security Site (NNSS), formerly known as the Nevada Test Site (NTS), requires the use of underground tunnels and shafts. In order to provide the safest work environment possible for NNSS workers, Mine Rescue Teams (MRTs) are required to ensure proper rescue services in an emergency situation. Background The MRTs must comply with Mine Safety and Health Administration (MSHA) requirements and with stipulations that include a requirement for a minimum of two MRTs to be

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    During the height of operations in the 1960s, the Jackass & Western Railroad, located in Area 25 of the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), was the shortest and slowest operating railroad in the United States. However, it was the railroad's important mission that made it such: the railroad trans- ported research reactors, NERVA reactors/ nuclear engines, and equipment between facilities at the NTS Nuclear Rocket Development Station (NRDS) in

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nevada National Security Site (NNSS) provides a unique and indispensable extension of the national laboratories' experimental capabilities in support of the Stockpile Stewardship Program. In addition to ongoing environmental cleanup of historic nuclear research and testing areas on the NNSS, non-defense research and development activities are conducted in cooperation with universities, industries, and other federal agencies. In the beginning After the first nuclear test at the Trinity Site in

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Five of the first six nuclear tests conducted by the United States occurred in the far reaches of the Pacific Ocean. Almost immediately, scientists and military planners discovered that logistics, weather, security and safety concerns required the need for a continental test site. The effort of transporting, supplying and housing a nuclear test task force in the middle of the Pacific was more than originally anticipated. In addition to the communist insurgency in Korea, the need for a

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Before Neil Armstrong stepped foot on the moon on July 20, 1969, Armstrong, and astronauts Dick Gordon, Buzz Aldrin, Dave Scott, and Russell "Rusty" Schweikart left their footprints on the Nevada Test Site, now known as the Nevada National Security Site (NNSS) as part of their lunar training. Training Mission Their three-day visit began on February 16, 1965. It was the first training mission by a group of astronauts from the National Aeronautics and Space Administration (NASA). Their

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    earliest media reports of atmospheric nuclear testing in Nevada were based on eyewitness accounts. News reporters considered it a sign of importance when invited to watch detonations from News Nob, a large pile of volcanic tuff situated on the edge of Yucca Lake at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Thousands of newsmen trekked to observe and write about atomic mushroom clouds billowing above the desert of Nevada in the 1950s. Their articles were eagerly

  19. Progress on SCADA Data Based Wake Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Progress On SCADA Data Based Wake Analysis Sandia National Laboratories Carsten Westergaard*, Shawn Martin, Ben Karlson, Carter Charles, Jonathan White Correspondence email: cahwe@sandia.gov Windpower Monthly's Wind Data Forum, Houston, March 14-16, 2016 Acknowledgement: This work has been funded under the Department of Energy's Continuous Reliability Enhancement for Wind (CREW) project and the A2E program. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia

  20. Introduction

    Energy Savers [EERE]

    Introduction EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Policy and Logistical Challenges to Smart Grid Implementation." EnerNOC is a leading provider of demand response and energy efficiency solutions to utilities, Independent System Operators ("ISOs") and customers in the commercial, industrial and institutional ("CI&I") sectors. EnerNOC uses near real-time

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rare occasions, vertical drill holes have been used for effects tests at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Huron King was a Vertical Line of Site (VLOS) underground test conducted at the Nevada Test Site on June 24, 1980 by the Defense Nuclear Agency, now the Defense Threat Reduction Agency (DTRA), U.S. Department of Defense. Background DTRA, in cooperation with the U.S. Department of Energy, and its predecessor, the Atomic Energy Commission, began

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mercury, Nevada, a town 65 miles northwest of Las Vegas, is the gateway to the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). There is no evidence as to how Mercury was named, but legend says that an unknown miner worked in the Calico Hills in the 1850s mining mercury- bearing ore. His route of travel became known as the Mercury Road, and the area surrounding it became known as Mercury. Almost one hundred years later the Atomic Energy Commission (AEC) built

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The desert temperature hovered at 90 degrees Fahrenheit the morning of July 17, 1962 at the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). Eventually the beating sun would increase the heat to over 105 degrees later that day, but at 10:00 a.m., a crowd of 396 spectators braved the scorching temperature and relentless sun to witness the last atmospheric test ever conducted by the United States. The crowd gathered in Area 18 of the NTS, approximately two miles from

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Larger than the state of Rhode Island, the Nevada National Security Site (NNSS) occupies approximately 1,375-square miles (approximately 880,000 acres) in southern Nevada, making it one of the largest restricted-access areas in the United States. The NNSS is surrounded by approximately 6,500 square miles of federal land used for the U.S. Air Force Nevada Test and Training Range, and the Desert National Wildlife Refuge. Located approximately 65 miles northwest of Las Vegas, the NNSS is vast,

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Age spanned from the 1940s through the 1990s. Key occurrences during that period, including events that precipitated the era and crucial milestones along the way, are documented in this timeline. An important part of the nuclear age occurred at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). Between 1951 and 1992 a total of 928 nuclear tests were conducted at the NTS, 828 of which were underground. A total of 126 nuclear tests were conducted at other

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The Atomic

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    first nationally televised nuclear shot, "Annie" was conducted on March 17, 1953. Annie was also part of a civil effects test named Operation Cue, conducted by the Federal Civil Defense Administration (FCDA). On May 5, 1955 a 29-kiloton device named Apple 2 was detonated from a 500- foot tower on Yucca Flat at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), approximately 65 miles northwest of Las Vegas. It was the second nationally televised nuclear test

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    527 feet, the BREN (Bare Reactor Experiment -- Nevada) Tower was the largest free- standing structure west of the Mississippi River. It was also one of the best known and most visible landmarks at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). It was taller than the Empire State Building (1,454 feet, to top of lightening rod) and almost twice as tall as the Eiffel Tower (1,063 feet, with antenna). It was constructed of 51 thirty-foot sections of high tensile steel

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    May 25, 1953, during the Operation Upshot-Knothole test series at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), a milestone occurred in ordnance development. A 280-mm cannon, nicknamed Atomic Annie, fired the first and last nuclear projectile as part of the Grable test. The MK-9 artillery shell was propelled a distance of seven miles. It exploded in the air and had a yield of 15 kilotons (15,000 tons of TNT). Deployment Two 280-mm cannons were shipped by rail from

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    diverse and complex mosaic of plant and animal communities are found at the Nevada National Security Site. Representative of both the Mojave and Great Basin deserts, approximately 1,500 ani- mal species, including 924 species of insects, and 750 different kinds of plants are documented at the site. The varying elevations and climatic conditions at the test site contribute to the distribution of plant and animal communities. On the south end of the site, Jackass Flats lies at a low 2,688 feet

  11. Introduction

    Office of Environmental Management (EM)

    The idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The

  12. Lemnos Interoperable Security Program (May 2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Program (May 2008) Lemnos Interoperable Security Program (May 2008) Creating common language and metrics for describing functions of network security tools and testing for interoperability PDF icon Lemnos Interoperable Security Program (May 2008) More Documents & Publications Lemnos Interoperable Security SECURITY CORE FUNCTION AND DEFINITION REPORT DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

  13. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOEOE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOEOE ...

  14. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  15. Hallmark Project Commercialization of the Secure SCADA Communications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Intruders could severely disrupt control system operation by sending fabricated information or commands to control system devices. To ensure message integrity, supervisory control ...

  16. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... virus scanners or the process of performing a scan may have the effect of a denial of service on most control system networks. Some vendors supply tested virus protection ...

  17. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  18. Security is Not an Option | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other industries. Here's a look at progress to date. PDF icon Security is Not an Option More Documents & Publications Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE National SCADA Test Bed Program Multi-Year Plan National SCADA Test Bed - Enhancing control systems security

  19. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  20. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management ...

  1. Good Practice Guide on Firewall Deployment for SCADA and Process Control

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Networks | Department of Energy Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both critical and non-critical communications. While beneficial in other areas, use of these common protocols

  2. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector from cyber attack PDF icon Strengthening Cyber Security More Documents & Publications Considering Cumulative Effects Under the National Environmental Policy Act (CEQ, 1997) Vision for 2025: A Framework for Change Demand Response and Smart Metering Policy Actions Since the Energy Policy Act of 2005: A Summary for

  3. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. ...

  4. Visualizing Wind Farm Wake Losses using SCADA Data

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Continuous Reliability Enhancement for Wind Visualizing Wind Farm Wake Losses using SCADA Data Sandia National Laboratories Carsten H. Westergaard, Jonathan White and Shawn Martin IEA Wind TEM#78 on Field Test Instrumentation and Merasurement Best Practices, October 7 and 8, 2014 Acknowledgement: This work has been funded under the Department of Energy's Continuous Reliability Enhancement for Wind (CREW) project. Sandia National Laboratories is a multi-program laboratory managed and operated by

  5. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    SciTech Connect (OSTI)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a new Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.

  6. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  7. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  8. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    SciTech Connect (OSTI)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell; Woloshun, Keith Albert; Dale, Gregory E.

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  9. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  10. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  11. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  12. Hierarchical EMS/SCADA system, Magyar Villamos Muevek Ttroeszt, Hungarian Electricity Board, feasibility study report. Export trade information

    SciTech Connect (OSTI)

    Not Available

    1991-10-01

    The report concludes a feasibility and requirements study for the Hungarian Eectricity Board (MVMT) to upgrade MVMT's nationwide, hierarchical Energy Management System/Supervisory Control and Data Acquisition (EMS/SCADA) system. The study has resulted in a time-phased implementation plan for the recommended cost-effective solutions, with the associated project schedules and budgetary cost estimates. Specific recommendations are presented for the following closely related implementation projects: The upgrading of an existing EMS in the National Dispatch Center (NDC) including the associated remote facilities at major substations and power plants; The modernization or replacement of the existing SCADA systems and/or implementation of new systems at the regional electric power companies; and The expansion and upgrading of the data communication network that will be required to connect and support the nationwide EMS/SCADA facilities.

  13. Microsoft Word - 4March08_SCADA_Procurement.doc

    Energy Savers [EERE]

    48D7DF19-707E-28B27A.doc Microsoft Word - 48D7DF19-707E-28B27A.doc PDF icon Microsoft Word - 48D7DF19-707E-28B27A.doc More Documents & Publications Microsoft Word - ARRAAttachment12v1.doc Microsoft Word - Fact Sheet Energy Speech 082508 FINAL.doc Microsoft Word - GSP_Charter.doc

    INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance INL/EXT-06-11516 Revision 3 Cyber Security Procurement Language for Control Systems Version 1.8 Sponsor: Department of

  14. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  15. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  16. OIC Introduction

    Energy Savers [EERE]

    OIC Introduction David McCall Chair - OIC Liaison Task Group Senior Strategic Planner - Intel Corporation Constrained Devices The Internet of Things 2 Data Centers Cloud Rich...

  17. SLURM Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SLURM Introduction SLURM Introduction SLURM (Simple Linux Utility For Resource Management) is a very powerful open source, fault-tolerant, and highly scalable resource manager and job scheduling system of high availability currently developed by SchedMD. Initially developed for large Linux Clusters at the Lawrence Livermore National Laboratory. As of June 2015, SLURM is used in 6 of the top 10 computers, including #1 system, Tianhe-2, with over 3M cores. SLURM has been in production on Babbage

  18. Introduction - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hero Image ©bobpaz.com0082.JPG Research Research Introduction Thrusts Library Resources Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database JCAP seeks to discover new ways to produce hydrogen and carbon-based fuels using only sunlight, water and carbon dioxide as inputs Why Solar FuELs?

  19. Posters Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 Posters Introduction A large irrigated vegetation area in a semiarid or relatively dry location is a strong surface forcing of thermal circulations (Hong et al., in press). Several observational studies have found that such thermally induced mesoscale circulation may contribute to the triggering and development of convective clouds (Barnston and Schickedanz 1984; Wilson and Schreiber 1986; Rabin et al. 1990). In the western United States, extensive areas of irrigated farmland are surrounded by

  20. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  1. Introduction A

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction A merica has the technological capacity to change its energy future. There is no reason, for example, why our nation must continue following a path of rising oil imports when billions of barrels of crude oil remain in domestic oil fields. There is no reason why we cannot continue to use our abundant supplies of high-value, low-cost coal when we have the scientific know-how to remove virtually all of its pollutants and reduce greenhouse gas emissions. There is no reason why we cannot

  2. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security

  3. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  4. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  5. Microsoft PowerPoint - SS1_4H_NERC_Training_09_28_06.ppt

    Energy Savers [EERE]

    Introduction SCADA Security for Managers and Operators September 28, 29, 2006 2 SANS SCADA Security Summit II September 28, 29, 2006 Disclaimer * References made herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the U.S. Government, any agency thereof, or any company affiliated with the Idaho National Laboratory. * Use the described security

  6. Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Security Policy, Office of Security, Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU). The Office of Security...

  7. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands...

  8. Microsoft PowerPoint - TFG Nov 2015.pptx

    Office of Environmental Management (EM)

    ENERGY Introduction SCADA Security for Managers and Operators September 28, 29, 2006 2 SANS SCADA Security Summit II September 28, 29, 2006 Disclaimer * References made herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the U.S. Government, any agency thereof, or any company affiliated with the Idaho National Laboratory. * Use the described

  9. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  10. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  11. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  12. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  13. Introduction to Neutrino Physics

    SciTech Connect (OSTI)

    Linares, Edgar Casimiro

    2009-04-30

    I present a basic introduction to the physics of the neutrino, with emphasis on experimental results and developments.

  14. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  15. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role:

  16. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information ...

  17. Secure ICCP IntegrationConsiderations and Recommendations

    Broader source: Energy.gov [DOE]

    The goal of this report is to identify the operation and implementation issues associated with the introduction of the secure form of the Inter-control Center Communications Protocol, or ICCP,...

  18. SMART GRID: an introduction. | Department of Energy

    Energy Savers [EERE]

    SMART GRID: an introduction. SMART GRID: an introduction. Our nation's electric power infrastructure that has served us so well for so long - also known as "the grid" - is rapidly running up against its limitations. Our lights may be on, but systemically, the risks associated with relying on an often overtaxed grid grow in size, scale and complexity every day. From national challenges like power system security to those global in nature such as climate change, our near-term agenda is

  19. Introduction and overview

    SciTech Connect (OSTI)

    None, None

    2009-01-18

    The Renewable Energy Technology Characterizations introduction outlines describe the technical and economic status of the major emerging renewable energy options for electricity supply.

  20. Introduction to Vol. Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part I (1950-1987) An error occurred. Try watching this video on...

  1. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Secur

  2. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  4. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    From a Department of Defense (DoD) perspective, SMrs offer great advantage for energy security with stable fuel cost profiles, a secure installation for meeting base-load power demands with a robust, secured reactor design (i.e., energy security), potential to provide potable water and synthetic fuels, and a means to exceed DoD greenhouse gases (GhG) reduction goals. While presently SMrs are being proposed based on various reactor technologies, SMrs based on light-water reactor (lWr)

  6. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  8. DOE/ID-Number

    Office of Environmental Management (EM)

    in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities ... of the National Supervisory Control and Data Acquisition (SCADA) Test Bed (NSTB) program. ...

  9. Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards

    Energy Savers [EERE]

    Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards Introduction As recent attacks, Presidential Executive Order for Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21 for Critical Infrastructure Security and Resilience have illustrated, managing security risks to our most important organizations and systems, including the electric grid, has become a national security priority. Enterprise security program

  10. security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit Participants in Apex Gold at Lawrence Livermore National Laboratory. What would national leaders do in the face of a transnational nuclear terrorism threat? Last week, ministers and other senior delegates from 37 nations, along with representatives from the International Atomic Energy Agency, the... Pantex Plant's Calvin Nelson honored as Analyst of the Year for Transportation Security

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  12. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  13. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security...

  14. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  15. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  16. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands needed to build the code and when changes are made to a source file, recompiles only the necessary files. make creates and updates programs with a minimum of effort. A small initial investment of time is needed to set up make for a given software project, but afterward, recompiling and linking is done consistently and

  17. Introduction to PGAS Languages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PGAS Languages Introduction to PGAS Languages Introduction Partitioned Global Address Space Languages (PGAS) provide a parallel programming model based on the assumption that the global memory adress space is logically partitioned with a portion of the memory being assigned to a specific processor. Two common PGAS languages are Unified Parallel C (UPC) and Co-array Fortran (CAF). The first implementation of this tutorial is based on UPC and CAF. This tutorial assumes that you have some

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  19. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  2. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  4. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  5. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  6. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and state regulators,

  7. 1. INTRODUCTION | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1. INTRODUCTION PDF icon 1. INTRODUCTION More Documents & Publications Tribal Comments Database OIEPP Letter on Roundtable Sessions ICEIWG Meeting Agendas and Summaries

  8. National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  12. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved within B 174. Use

  13. Introduction.PDF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    III Comment Response Document September 1997 Department of Energy Carlsbad Area Office Carlsbad, New Mexico This Document Printed on Recycled Paper DOE/EIS-0026-S-2 COMMENT RESPONSE DOCUMENT TABLE OF CONTENTS TC-1 TABLE OF CONTENTS ACRONYMS AND ABBREVIATIONS ............................................................AC-1 INTRODUCTION .........................................................................................IN-1 1.0 ALTERNATIVES

  14. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is charged with

  15. Y-12 National Security Compex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Compex

  16. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  18. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  19. THE GUIDANCE I. INTRODUCTION

    Energy Savers [EERE]

    published for public review and comment Dec 2014 1 THE GUIDANCE I. INTRODUCTION The Council on Environmental Quality (CEQ) issues this guidance to provide Federal agencies direction on when and how to consider the effects of greenhouse gas (GHG) emissions 1 and climate change in their evaluation of all proposed Federal actions 2 in accordance with the National Environmental Policy Act (NEPA) and the CEQ Regulations Implementing the Procedural Provisions of NEPA (CEQ Regulations). 3 The guidance

  20. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0672P Sandia National Laboratories is developing a thermal-to-electric power conversion technology that utilizes carbon dioxide (CO2) as the working fluid in a closed Brayton cycle. This technology possesses the capability to generate electricity at high efficiencies while reducing both costs and greenhouse gas emissions.

  2. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  4. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ExcEptional sErvicE in thE national intErEst Investigating Containment Integrity Sandia is a nationally and internationally recognized leader in Nuclear Reactor containment research, supporting operations, lifetime extensions, and security and vulnerability assessments over a broad range of phenomena. Sandia's expertise includes evaluation of containment when subjected to high velocity impacts, enormous pressures and stresses, and attacks by saboteurs. Sandia's resources enable the completion of

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after 9/11. these comprehensive analyses were able to realistically represent the actual attack, the response of the facility to the

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision applications to Systems assessment over the last three decades, Snl has developed and applied a Systems Engineering (SE) approach that includes performance assessment (pa) expertise to inform key decisions concerning radioactive waste management both in the US and internationally. the result of these efforts is a pa-based SE

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  9. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  10. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sector. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  11. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  12. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    physical security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  13. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear ...

  14. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for ...

  15. Introduction to High Performance Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to High Performance Computing Introduction to High Performance Computing June 10, 2013 Photo on 7 30 12 at 7.10 AM Downloads Download File Gerber-HPC-2.pdf...

  16. Introduction to Control Part 1

    SciTech Connect (OSTI)

    Scheinker, Alexander

    2015-07-13

    Presentation that offers an introduction to Control Theory, sponsored by the Los Alamos National Laboratory, Low Level RF Control Group.

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  18. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  19. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  20. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nonproliferation Global Material Security The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, as well as to build capacity to deter, detect and interdict the illicit trafficking of such materials. GMS achieves its mission through three subprograms: International Nuclear Security Radiological Security Nuclear Smuggling Detection and Deterrence (formerly Second Line of

  1. International Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such as

  2. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  3. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NSEC » Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5 665-1144 Email Energy Security Council The Los Alamos National Laboratory Energy Security Council works to develop new ideas for reliable, secure and sustainable carbon neutral energy solutions for the nation. We serve as the portal to LANL's diverse energy security research

  4. Introduction to Framework | Open Energy Information

    Open Energy Info (EERE)

    Introduction to Framework (Redirected from Introduction to Methodology) Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans,...

  5. Briefing, Introduction to Classified Information - June 2014...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to Classified Information - June 2014 Briefing, Introduction to Classified Information - June 2014 June 2014 This briefing provides an introduction to classified...

  6. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  7. Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  8. Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  9. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  10. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  11. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  12. Introduction: Regional Dialogue Contract Templates

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction: Regional Dialogue Contract Templates October 17, 2007 1. Summary * BPA invites comments on the first draft of the Regional Dialogue Master Template by Friday,...

  13. Introduction to BPA Film Collection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to BPA Film Collection: Volume One, Disc One, 1939-1954 An error occurred. Try...

  14. Nuclear Security Enterprise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Study options for ensuring the safety, security, and reliability of nuclear warheads on a ... required to ensure the long-term safety, security, and reliability of the nuclear arsenal.

  15. American Energy and Manufacturing Competitiveness Summit Introduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis Description Introduction video for the American Energy and Manufacturing ... for the American Energy and Manufacturing Competetitiveness Summit Introduction video. ...

  16. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  17. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  18. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  19. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... of September 24, 2011 3 The Department of Energy (DOE) National Nuclear Security ...

  1. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of...

  2. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  3. Introduction to Brookhaven National Laboratory

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to Brookhaven National Laboratory Patrick Looney Department Chair Sustainable Energy Technologies (SET) Global and Regional Solutions Directorate (GARS) STEAB Meeting June 26, 2012 Introduction to BNL * Facts, figures, facilities overview * BNL energy strategy - Building Discovery to Deployment pipelines - Tools for a Smarter Grid - Distributed Generation and Renewables Integration * Meeting sustainability goals through research * Discussion 2 FY 2011 Total Lab Operating Costs: $652

  4. Radiological Security Partnership | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership Information

  5. spread_comp_02 TOC

    Energy Savers [EERE]

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 21 Steps 1. Identify all connections to SCADA networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Disconnect unnecessary

  6. untitled

    Office of Environmental Management (EM)

    Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 21 Steps 1. Identify all connections to SCADA networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Disconnect unnecessary

  7. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  8. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  10. Introduction to ESPC ENABLE Program

    Broader source: Energy.gov [DOE]

    Webinar provides participants with an introduction to the Energy Savings Performance Contract (ESPC) ENABLE program, an overview of the process, and next steps on how to move forward with a project...

  11. Systems Analysis Workshop Welcome & Introductions

    Broader source: Energy.gov [DOE]

    Welcome and introduction to the DOE Systems Analysis Workshop held in Washington, D.C. July 28-29, 2004 to discuss and define role of systems analysis in DOE Hydrogen Program.

  12. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement

  13. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About / Our Programs / Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and

  14. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  15. Document Number Q0029500 Introduction

    Office of Legacy Management (LM)

    Introduction 1.0 Introduction This Remedial Investigation (RI) AddendumRocused Feasibility Study (FFS) report updates the 1998 final RI and presents the results of a FFS conducted for Operable Unit (OU) 111, contaminated surface water and ground water, of the Monticello Mill Tailings Site (MMTS). These documents are combined to promote better reference between the updated RI information and the remedy comparisons of the FFS. This document is prepared by the U.S. Department of Energy (DOE) Grand

  16. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Rights / Workforce Statistics National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual Report

  17. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    25M NNSA Grant for Nuclear Science and Security Research Working With PNNL Mentors, Engineering Students Deliver Prototype Safeguards Fixtures Shaping the future of nuclear ...

  18. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  19. Nuclear Security 101 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twenty-eight nations have plans to eliminate all current stocks of HEU by the end of 2013. Upgrading security measures, including physical protection, material control and ...

  20. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Announces 2014 Security Professional of the Year Awards Michael Lempke receives NNSA's Gold Medal of Excellence NNSA's Nevada Field Office Transfers Two Armored Vehicles to FBI...

  1. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy Administrator for Defense Nuclear Nonproliferation (DNN), David Huizenga, participated in a ceremony commemorating the transition of a radiation detection system at the Port of Yangshan to the General

  2. Kansas City National Security Campus | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Operations Acquisition and Project Management M & O Support Department Kansas City National Security Campus Kansas City National Security Campus National Security Campus ...

  3. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments This document ...

  4. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password ...

  5. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  6. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  7. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  8. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  9. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  10. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  11. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NSS Archive National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Archive National Security Science magazine showcases the importance, breadth, and depth of the Laboratory's scientific and technical work that is used to solve key challenges to U.S. national security. NSS April 2016 April 2016 viewer | web | print NSS July 2014 July 2015 viewer | web | print NSS July 2014 December 2014 viewer | web | print NSS July 2014 July 2014 viewer | web

  12. Lemnos Interoperable Security Program

    Energy Savers [EERE]

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  13. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy ... Hydrogen Infrastructure Hydrogen Production Market Transformation Fuel Cells ...

  14. PNNL: Security & Privacy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect

  15. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  16. Security, Safety and Health

    Energy Savers [EERE]

    Security Through Innovation Security Through Innovation December 2, 2014 - 2:28pm Addthis Security, in all forms, can thrive through innovation. With a mission scope that encompasses technology, energy, science, and nuclear security, the Department of Energy (DOE) has been on the forefront of producing ground-breaking solutions to safeguard our nation's precious resources. DOE is working to develop and pioneer the next generation of technology solutions to protect our critical infrastructure.

  17. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. The Department's Unclassified Cyber Security Program - 2012, IG-0877

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information

  20. Renewing America's Nuclear Power Partnership for Energy Security and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Economic Growth | Department of Energy Renewing America's Nuclear Power Partnership for Energy Security and Economic Growth Renewing America's Nuclear Power Partnership for Energy Security and Economic Growth October 8, 2008 - 4:14pm Addthis Remarks as Prepared for Delivery by Secretary Bodman Thank you, Jamie, for that kind introduction. And many thanks as well to Secretary Gutierrez, Deputy Secretary Sullivan and the entire Commerce team for convening this important event. As always, it's

  1. Introduction to computers: Reference guide

    SciTech Connect (OSTI)

    Ligon, F.V.

    1995-04-01

    The ``Introduction to Computers`` program establishes formal partnerships with local school districts and community-based organizations, introduces computer literacy to precollege students and their parents, and encourages students to pursue Scientific, Mathematical, Engineering, and Technical careers (SET). Hands-on assignments are given in each class, reinforcing the lesson taught. In addition, the program is designed to broaden the knowledge base of teachers in scientific/technical concepts, and Brookhaven National Laboratory continues to act as a liaison, offering educational outreach to diverse community organizations and groups. This manual contains the teacher`s lesson plans and the student documentation to this introduction to computer course.

  2. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  3. International Biomass Conference and Expo | Department of Energy

    Energy Savers [EERE]

    Department of Energy Intermediate SCADA Security Training Course Slides (September 2006) Intermediate SCADA Security Training Course Slides (September 2006) Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to discover and identify system vulnerabilities (CIP-005 R3.2, CIP-005 R4, & CIP-007 R8); develop mitigation strategies for resolving these issues

  4. Introduction

    National Nuclear Security Administration (NNSA)

    in Livermore, California, was no longer permitted to perform large high explosive experiments at the facility due to community encroachment, a new site had to be identified. ...

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    However, by the mid-1950's, the atmosphere became hazy, limiting visibility and obscuring photography. In addition, encroachment of the neighboring Imperial Valley began to ...

  6. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    All rights reserved. What does Transmission Look Like? 2010 ICF International. All rights reserved. WHAT DOES ELECTRIC TRANSMISSION LOOK LIKE 4 Provide affordablereliable ...

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The test, although successful, brought the issue of drilling to the forefront. The need to ... At first, larger diameter holes were drilled with conventional "oil industry" drilling ...

  8. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Exposure Social *Energy Reliability (Diversification) *Energy Independence *Quality of Life *Community and Stakeholder Participation Environment *Climate Change *Mitigation ...

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 Prepared by: Michael G. Finn Science and Engineering Education Program Oak Ridge Institute for Science and Education December 2001 All opinions expressed in this paper are the author's and do not necessarily reflect policies and views of the U.S. Department of Energy or the Oak Ridge Institute for Science and Education. This document was prepared for the Division of Science Resources Studies of the National Science Foundation by the Oak Ridge Institute for Science and Education (ORISE)

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mixed-phase clouds, such as those found in the Arctic have presented quite a challenge to the modeling com- munity. Without modification, models have struggled to maintain the delicate balance between liquid and ice that must exist in order to maintain these clouds for ex- tended time periods, as they are observed in the atmo- sphere. In conjunction with the ARM Cloud Modeling working group we are investigating the ability of the University of Wisconsin Non-Hydrostatic Modeling System (UW-NMS)

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to TotalView Debugger Why a Debugger? * Developers need a way to understand the runtime behavior of their programs - When writing new code, porting code, adding features, scaling, tuning or optimizing - When troubleshooting bugs, code correctness, and memory analysis * The solution Rogue Wave has to this is TotalView - TotalView is a source code debugger for Linux, Unix and Mac which gives users visibility into and control over runtime execution - TotalView is especially compelling for users

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    When the Nevada Test Site was established in 1951, it provided a proving ground for a burgeoning U.S. nuclear weapons program. One hundred atmospheric nuclear tests occurred at the test site between 1951 and 1962. When the U.S. entered into an atmospheric testing moratorium, all testing moved underground. In 1992, the president instituted a moratorium on nuclear testing. In order to certify the safety and reliability of the nation's nuclear stockpile, developing improved computer models and

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Looking for historical information about the nuclear testing program? You can find records and information about the U.S. Department of Energy's (DOE) nuclear testing program at the Nuclear Testing Archive (NTA), located on East Flamingo Road in Las Vegas, Nevada. The facility, located adjacent to the Desert Research Institute and the University of Nevada Las Vegas, houses more than 375,000 documents in a 9,000-square-foot space equipped with special features for preserving the documents. The

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiation is energy in the form of waves or particles. Although radiation is around us every day, you cannot see, hear, or smell it. Radiation is detected by measuring the activity of the energy released as it decays. It comes from natural and man-made sources as unstable atoms decay to form more stable atoms. Different Types of Radiation Alpha particles travel only a few inches in the air and lose energy almost as soon as they encounter an obstacle such as a sheet of paper or the outer layer of

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    days of large, heavy, fission bombs, the possibility of dangerous nuclear accidents were minimized by assembling the bomb in the final moments before actual use. Modern nuclear weapons adopted 'sealed pit' designs in which all parts of the fission bomb were placed in their final configuration during assembly. This evolution created more compact, lightweight, and low maintenance nuclear weapons, but these weapons could not accommodate separate handling of internal components before actual use,

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    plant and animal life. The climate is arid, with an annual rainfall of six inches in the lower elevations, an ideal setting for the ignition of wildland fires. Wildland fires are not the only risks at the NNSS. Offices, facilities, and projects at the site are subject to a diverse range of operational risks and hazards that include the potential for significant emergencies. Background To mitigate these risks and provide protection for the surrounding public, personnel, and property at the NTS,

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    They are some of the most famous and eerie images to emerge from the Cold War: atmospheric nuclear tests captured one millisecond after detonation. Using a rapatronic camera developed by Harold Edgerton of Edgerton, Germeshausen & Grier Inc. (EG&G), a company specializing in electronic technology, the rapatronic camera was capable of photographing still images at the rate of 1/1,000,000 of a second. Background Dr. Harold Edgerton, a pioneer in strobe photography, developed the concept

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing Laboratory (RSL) is a center for creating advanced technologies that provides a broad range of scientific, technological, and operational disciplines with core competencies in emergency response operations and support, remote sensing, and applied science and technologies in support of counterterrorism and radiological incident response. Background The Atomic Energy Commission originally established the "Aerial Measurements Operations" at Nellis Air Force Base in Las

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    pre-dawn hours of January 24, 1978, a Canadian Mounted Police corporal located in Hay River, in the Canadian Northwest Territories, reported a meteor sighting. One hundred and twenty-fve miles north, in Yellowknife, a night janitor reported mysterious lights streaking across the darkened sky. What these eye-witnesses actually saw was the re-entry of the Soviet satellite Cosmos 954 into Earth's atmosphere. Background Cosmos 954 launched into orbit on September 18, 1977. The satellite was designed

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    plant and animal life. The climate is arid, with an annual rainfall of six inches in the lower elevations, an ideal setting for the ignition of wildland fres. Background The NNSS Fire & Rescue (F&R) was established on October 9, 1951. Today, the F&R service provides fre suppression, emergency medical, hazardous materials (HAZMAT) mitigation, technical rescue response, incident command functions and fre prevention activities to the site on a 24-hour basis. Prevention Several

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    What happens when you combine an accidental conventional explosion with the possibility of radiological contamination? You get a gigantic health and safety hazard. That health and safety hazard motivated the Sandia Corporation, now Sandia National Laboratories, to create a specialized structure in 1957 known as the Gravel Gertie, designed to prevent the release of radioactive particles into the atmosphere. The assembly cells, which have 12-inch thick concrete walls, are called Gravel Gerties

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sedan Crater was formed on July 6, 1962, when the U.S. Atomic Energy Commission, predecessor of the U.S. Department of Energy, conducted an excavation experiment using a 104-kiloton thermonuclear device. The test, detonated 635 feet underground, helped develop technology for earth moving projects. The awe-inspiring explosion displaced about 12 million tons of earth, creating a crater 1,280 feet in diameter and 320 feet deep. The force of the detonation released seismic energy equivalent to an

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Peter Skene Ogden, an Englishman on a Hudson Bay Company trapping expedition down the Humboldt River, was the first white man to enter northern Nevada. It was 1826, and Nevada was the last state to be explored by the white man. Until that time, Nevada had been inhabited by Paleo-Indians and migrants. During the same year, the famous trapper-explorer Jebediah Smith crossed the southern tip of the state on his way to California. The Old Spanish Trail, Nevada's oldest, was first traveled by

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    June 6, 1958, the United States Atomic Energy Commission, now the U.S. Department of Energy (DOE), announced the Plowshare Program, named for the biblical injunction to ensure peace by "beating swords into plowshares." The program was designed as a research and development activity to explore the technical and economic feasibility of using nuclear explosives for industrial applications. President Dwight D. Eisenhower introduced the concept in his "Atoms for Peace" speech

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Following the Trinity test and the bombings of Hiroshima and Nagasaki, military officials still knew very little about the effects, especially on naval targets, of nuclear weapons. Accordingly, the Joint Chiefs of Staff requested and received Presidential approval to conduct a test series during summer 1946. The test series, named Crossroads, was conducted at Bikini atoll in the Marshall Islands, which was far from population centers in the middle of the Pacific. Pacific testing offered ample

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 1981, the last cattle roundup took place at the U.S. Department of Energy's (DOE) experimental farm, managed for DOE by the U.S. Environmental Protection Agency (EPA). Operations at this unique, 30-acre experimental farm in Area 15 started in 1964 when the EPA was contracted to conduct research to determine if radioactive materials (radionuclides) found in the environment were being transported to humans. At the time, a major concern was the transport of radioiodine through the

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Peacekeeper (MX) is a four-stage intercontinental ballistic missile capable of carrying up to ten independently-targetable reentry vehicles with greater accuracy than any other ballistic missile. Its design combines advanced technology in fuels, guidance, nozzle design, and motor construction with protection against the hostile nuclear environment associated with land- based systems. Several Air Force Peacekeeper research and testing experiments took place from 1978 through 1982 in Area 25 of

  8. Introduction

    Office of Environmental Management (EM)

    as the nervous system of a nuclear power plant and other nuclear system applications. ... subjective evaluation of digital system safety drive the nuclear industry to choose ...

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... State- ment for the Acquisition of a Natural Gas Pipeline and Natural Gas Utility Service. ... 2012. Public meeting for Hanford Sitewide Permit. 2012 Hanford Public Involvement Survey - ...

  10. Introduction

    Office of Scientific and Technical Information (OSTI)

    Electrostatic Interactions between Peptides and the Molecular Chaperone DnaK W. Liu 1 , D. Bratko 1 , J. M. Prausnitz 1, 2 and H. W. Blanch 1 1 Department of Chemical Engineering, University of California, Berkeley, CA, 94720 2 Chemical Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA, 94720 January 16, 2003 Abstract The molecular chaperone DnaK prevents intracellular protein misfolding and aggregation by transiently binding with newly synthesized polypeptides and protein

  11. Introduction

    Office of Environmental Management (EM)

    on Implementation of the Section 180(c) Grant Program Annotated Outline and Appendices ... to update the Section 180(c) policy and procedures and to write a grant guidance document. ...

  12. Introduction

    Office of Scientific and Technical Information (OSTI)

    ... Upon completion of the work, guidelines will be developed for use by a vendor to begin ... Data Evaluation Completed 8105 Design Guidelines Completed 8105 WORK ANTICIPATED IN ...

  13. Introduction

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    Provides guidance for software engineering, project management, and quality assurance practices and procedures. Does not cancel other directives.

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... and cameramen - all cleared to access top secret and restricted data and sworn to secrecy ... the 1352nd Photographic Group and the U.S. Army Signal Corps began experimenting with ...

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... More specifics of the method recommended for testing in gaseous hydrogen can be found in the ASME Boiler and Pressure Vessel Code, Section VIII, Division 3, Article KD-10. 3.3 ...

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE Science Bowl competitions test students' knowledge in all areas of science and math. ... Science Bowl competitions encourage student involvement in math and science activities, ...

  17. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... 2019 - to less than 5 per gallon algal biofuel by 2019. - STATUS: Awards anticipated ... at Increasing Scale * Fuel Testing and Engine Development for High Octane Fuels * 2015 ...

  18. Introduction

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    The objective of this Guide is to improve the quality of cost estimates and further strengthen the DOE program/project management system. This Guide strives to achieve this goal by providing uniform cost estimating methods as well as consistent estimate terminology. No cancellation.

  19. Introduction

    National Nuclear Security Administration (NNSA)

    U1a Complex is an underground laboratory used for subcritical experiments; physics experiments that obtain technical information about the U.S. nuclear weapons stockpile. These ...

  20. Introduction

    Office of Environmental Management (EM)

    ... sodium coolant loops to evaluate their corrosion resistance and compatibility with coolants for LWR and fast ... for gigawatt sized reactors present significant ...

  1. Introduction

    Energy Savers [EERE]

    ... The results obtained from this project will provide useful guidelines for future design of ... 2) Using large scale classical molecular dynamics (MD) simulations, we have ...

  2. INTRODUCTION

    National Nuclear Security Administration (NNSA)

    ... Groundwater is approximately 236 m (774 ft) below the land surface. The climate is arid ... the transition times are on the order of thousands of years spanning changes in climate. ...

  3. Introduction

    Office of Environmental Management (EM)

    Department of Energy Introducing the Department of Energy Quadrennial Technology Review Introducing the Department of Energy Quadrennial Technology Review April 7, 2011 - 4:33pm Addthis Former Under Secretary Koonin Former Under Secretary Koonin Director - NYU's Center for Urban Science & Progress and Former Under Secretary for Science Recently, Secretary Chu asked me to kick off a new process at the Department of Energy: a Quadrennial Technology Review (DOE-QTR). The goal of the DOE-QTR

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Workforce Survey Report For Savannah River Site Community Reuse Organization June 8, 2009 Booz | Allen | Hamilton SRSCRO Nuclear Workforce Survey Report T A B L E O F C O N T E N T S 1. Background And Objectives Of The Nuclear Workforce Survey 3 Background 3 Survey Objectives 4 2. Scope Of The Survey 5 Participating Companies 5 Nuclear Workers Demand Beyond The SRSCRO Region 6 Key Job Classifications 7 3. Survey Results 8 Growth In Total Staffing Levels 8 Estimated New Hires 2010 - 2020

  5. Introduction

    Energy Savers [EERE]

    VP, Product Strategy Cree Yan Rodriguez VP, Product and Technology Acuity Brands Lighting Ed Clark Sustainable Strategist ZGF Architects Chris Bailey Dir. of Bus. Develop. & Prod....

  6. Introduction

    Broader source: Energy.gov (indexed) [DOE]

    Building Energy Efficiency Subcommittee to the Secretary of Energy Advisory Board November 6, 2012 Dr. J. Michael McQuade Matthew Rogers Dr. Arthur Rosenfeld Dr. Maxine Savitz...

  7. Introduction

    Energy Savers [EERE]

    ... IN 47906 Funding: 800,000 (10012014 - 09302017) Description of Project: The Fukushima nuclear accident of 2011 has highlighted the importance of designing safety-related ...

  8. Safeguards and Security and Cyber Security RM | Department of Energy

    Energy Savers [EERE]

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. PDF icon Safeguards and Security and Cyber Security RM More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 References, Canceled -7

  9. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, ... Over the past 65 years, the force has changed in size and structure but its mission has... ...

  11. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  12. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    material that it protects. Y-12 is the "Fort Knox" of uranium. We oversee the secure management and storage of strategic and special nuclear materials that have been removed...

  13. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or NNSA and Department of Energy (DOE) directives. Classified Matter Protection and Control ensures the protection and control of classified matter. It includes briefing and training requirements for personnel who work with classified on identifying, marking, reproducing, protecting, handling, transmitting,

  14. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  15. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. II. GENERAL COMPLIANCE SUPPLEMENT INTRODUCTION

    Energy Savers [EERE]

    II. GENERAL COMPLIANCE SUPPLEMENT INTRODUCTION The objectives of most compliance requirements for DOE programs are generic in nature. For example, most programs have eligibility requirements. While the criteria for determining eligibility vary by program, the objective of the compliance requirement that only eligible entities participate is consistent across all programs. Rather than repeat these compliance requirements, audit objectives, and suggested audit procedures for each program, they are

  17. An introduction to coastal geomorphology

    SciTech Connect (OSTI)

    Pethick, J.S.

    1984-01-01

    This book is an introduction to wave and tidally dominated coastal forms, including beaches, cliffs, dunes, estuaries, mudflats and marshlands. The book emphasises the physical mechanisms by which this variety of landforms is produced and maintained. It introduces the energy outputs - waves, currents, tides - into the coastal 'machine', examines the way in which this energy is converted into water and sediment movement, and leads to an account of coastal landform development.

  18. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Administration labs and sites get girls excited about engineering Wednesday, March 16, 2016 - 1:41pm Future engineers K. Potter, left, and T. Herrin at Y-12 National Security Complex's Introduce a Girl to Engineering event. NNSA workers across the nuclear security enterprise took advantage of "Introduce a girl to engineering day" to instill hundreds of young women with excitement for science, technology, engineering, and math (STEM) careers. This year's theme,

  19. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear weapons and in science for national and global security April 2016 july 2015 The Hurt-Locker School Explosive Results Questing for the Holy Grail of High Explosives Learning from (Near) Disaster A Safer Liftoff Shake, Rattle, and Roll Manhattan Project National Historical Park Strategic Deterrent Forces Charting a

  20. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA hosts CTBT inspectors at Nevada National Security Site Read more Y-12 honors its inventors for technology transfer Read more Sandia National Laboratories Contract Process Announced Read more NNSA honors two security professionals who protect U.S. nuclear enterprise Read more NNSA lab makes fire tornados to ensure weapon safety Read more Sandia's California site invites community to 60th anniversary Read more CTBT inspectors Tech Transfer Sandia Contract Security awards Fire tornados Sandia

  2. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  3. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  4. Visualization & Controls Program Peer Review | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This need is being addressed by SCADA Energy Management System (EMS) Cyber Security Assessments conducted at the National SCADA Test Bed (NSTB) facility at INL and at on-site ...

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  6. Security Forms and Information

    Broader source: Energy.gov [DOE]

    Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees...

  7. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  8. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  9. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  10. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  11. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or 1-888-246-2460 using the following timeframes

    using the following timeframes

    //A * ~ w r_ra (b11 II V &. l,4t~Cf..-"i National Nuclear Security Administration DOE/NV--325-Rev. lOa February 2015 Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security Site Waste Acceptance Criteria Disclaimer Notice

  12. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  13. Provision of mobile and man-portable radiation detection equipment;
  14. Regional cooperation on safeguards...

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  17. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  18. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  19. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  20. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  21. Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... or mentalpersonality disorders, alcohol abuse, use of illegal drugs or the abuse ... in the Human Reliability and Alcohol Abuse Within the Office Secure ...

  22. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  1. Security Council Approval of Kofi

    Energy Savers [EERE]

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation. PDF icon Security Control Assessor Core Competency Training Worksheet More Documents &

  2. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  3. Introduction to Renewable Energy Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to Renewable Energy Technology A YEAR-LONG SCIENCE & TECHNOLOGY COURSE by Matthew A. Brown Lakewood High School Lakewood, CO Lakewood High School Red Rocks Community College Smart Energy Living Alliance Metro Denver WIRED Initiative Introduction Page i-i Revision date: 6/1/08 This curriculum is a partnership between: Lakewood High School Matthew Brown, maabrown@jeffco.k12.co.us Suzanne McClung, smcclung@jeffco.k12.co.us 9700 W. 8th Ave., Lakewood, CO 80215 303.982.7096

  4. Introduction to OpenCL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OpenCL Introduction to OpenCL OpenCL at NERSC OpenCL is an open standard for programming heterogeneous computers composed of CPUs, GPUs and other processors. OpenCL consists of a framework to define the platform as a host (typically a CPU) and one or more compute devices (e.g. a GPU) plus a C-based programming language for writing programs for the compute devices. Using OpenCL, a programmer can write parallel programs that use all the resources of the heterogeneous computer. We give an example

  5. Introduction to Airborne Tritium Tritides

    Office of Environmental Management (EM)

    Introduction EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Policy and Logistical Challenges to Smart Grid Implementation." EnerNOC is a leading provider of demand response and energy efficiency solutions to utilities, Independent System Operators ("ISOs") and customers in the commercial, industrial and institutional ("CI&I") sectors. EnerNOC uses near real-time

  6. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  7. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  8. Operations Security (OPSEC) Reminder

    Broader source: Energy.gov [DOE]

    DOE O 471.6, Section 4.f, Information Security Manual and the DOE Headquarters Facilities Master Security Plan, Section 8, OPSEC, require that each element review information before it is posted to their publicly accessible website to ensure the data does not contain Controlled Unclassified Information and/or sensitive (critical information).

  9. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  13. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  14. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  15. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  16. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  17. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  18. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  19. Procurement Division Introduction | Princeton Plasma Physics...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organization Business Operations Procurement Division Procurement Division Introduction Travel and Conference Services Careers Human Resources Directory Environment,...

  20. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  1. Securing energy assets and infrastructure 2007

    SciTech Connect (OSTI)

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  2. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  3. Categorical Exclusion Determinations: Health, Safety, and Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Health, Safety, and Security Categorical Exclusion Determinations: Health, Safety, and Security Categorical Exclusion Determinations issued by Health, Safety, and Security. ...

  4. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  5. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  6. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  7. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  8. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  9. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ... Related Articles U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass ...

  10. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  11. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  12. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  13. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  14. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  15. Security Control Assessor | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, ...

  16. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  17. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  18. Headquarters Facilities Master Security Plan

    Energy Savers [EERE]

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of:  Title 32, CFR, Part 2001, Classified National Security Information  Executive Order 13526, Classified National Security Information  DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3  DOE Order 475.2A, Identifying Classified Information  DOE Order 475.1, Counterintelligence Program The Security Awareness

  19. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  20. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information related to the Building Performance Database (BPD) security and software controls. PDF icon Building Performance Database (BPD) Security More Documents & Publications ...

  1. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  2. Safeguards & Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    cyber system operations and security, and business and budget operations including property management. Supports EM headquarters with safeguards and security assistance. ...

  3. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Leadership, Governance Los Alamos National Security, LLC Los Alamos National Security, LLC (LANS) The Lab's mission is to develop and apply science and technology to...

  4. Accomplishments | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ... In FY 2009, ASC released improved codes to support stockpile stewardship and other nuclear security missions, including secure transportation, NSE infrastructure, and nuclear ...

  5. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  6. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  7. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  8. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  9. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    not download the form and save on place it on your hard drive. Proper Completion of Security Termination Statements: When completing Security Termination Statements for submittal...

  10. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  11. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  12. Nevada National Security Site

    Broader source: Energy.gov [DOE]

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  14. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  15. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  16. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  17. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  18. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  19. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  1. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  2. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  3. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  4. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  5. Fuel Cell Technologies Program Multi-Year Research, Development and Demonstration (MYRDD) Plan - Section 1.0: Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction Multi-Year Research, Development and Demonstration Plan Page 1 - 1 Multi-Year Research, Development and Demonstration Plan Page 1 - 1 1.0 Introduction The U. S. Department of Energy's (DOE's or the Department's) hydrogen and fuel cell efforts are part of a broad portfolio of activities to build a competitive and sustainable clean energy economy to secure the nation's energy future. Reducing greenhouse gas emissions 80 percent by 2050 1 and eliminating dependence on imported fuel

  6. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  7. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  8. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.

  9. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  10. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  11. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  12. Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    companies get boost from Los Alamos National Security November 19, 2012 Venture Acceleration Fund awards help region's businesses grow LOS ALAMOS, New Mexico, November 19, 2012- Two local biotech start ups, a water and power company and a hardware inventor are the latest recipients of $165,000 in Venture Acceleration Fund (VAF) awards from Los Alamos National Security, LLC. Mustomo, Inc., IX Power, Synfolia, and Tape-Ease will receive funding to take their products and services to the next

  13. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    200 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 7, 2010 Employee volunteer efforts to be recognized LOS ALAMOS, New Mexico, June 7, 2010-Nonprofit organizations are receiving more than $117,000 from Los Alamos National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits as a result of the volunteer efforts of Los Alamos National

  14. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    20 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex Performance Period: October 2012 - September 2013 December 24, 2013 APPROVED FOR PUBLIC RELEASE This document has been approved for release to the public by: Name / Title: Scott A. Hawks, NPO Y-12 Classification Officer Date: 12/31/2013 NNSA Production Office, Y-12 Page 2 of 20 Executive Summary This

  15. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  16. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  17. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  18. Technology Convergence and National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Convergence and National Security Rob Leland Sandia National Laboratories To Be Determined T.B.D. Outline * Part 1: National Security * Part 2: Technology Convergence * Part 3: An example Part 1: National Security What is national security? Global Constructive Destructive * Resource conflicts * Sustainable dev. * Ecomigration * Conventional engage. * Nuclear deterrence *Military containment * Prosperity * Health care * Education * Terrorism * Crime Environmental Local Human need War Homeland

  19. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  20. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  1. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  2. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process PDF icon Security Review Process More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  3. Introduction to SAE Hydrogen Fueling Standardization

    Broader source: Energy.gov [DOE]

    Download presentation slides and questions and answers from the DOE Fuel Cell Technologies Office webinar, Introduction to SAE Hydrogen Fueling Standardization, held on September 11, 2014.

  4. 2013 SSL Market Introduction Workshop Presentations Posted

    Broader source: Energy.gov [DOE]

    DOE has posted the presentations and materials from the eighth annual Solid-State Lighting Market Introduction Workshop, held November 12-14 in Portland, OR.

  5. Introduction to Renewable Energy Project Finance Structures

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FEDERAL ENERGY MANAGEMENT PROGRAM Introduction to Renewable Energy Project Finance Structures Jason Coughlin Jason.Coughlin@nrel.gov October 3rd, 2012 2 | FEDERAL ENERGY MANAGEMENT ...

  6. Introduction to Chemistry and Material Sciences Applications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Chem and MatSci Apps Introduction to Chemistry and Material Sciences Applications June 26, 2012 Last edited: 2016-04-29 11:34:4

  7. Introduction to Chemistry and Material Sciences Applications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Chem and MatSci Apps Introduction to Chemistry and Material Sciences Applications June 26, 2012 L ast edited: 2015-12-11 16:11:02...

  8. Introduction to Vol Two Part Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part II (1950-1987) An error occurred. Try watching this video on...

  9. Building America Webinar: Introduction - Who's Successfully Doing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Building America Webinar on May 21, 2014: Introduction Building America Webinar: Retrofitting Central Space Conditioning Strategies for Multifamily ...

  10. Types of Lighting in Commercial Buildings - Introduction

    U.S. Energy Information Administration (EIA) Indexed Site

    Introduction Lighting is a major consumer of electricity in commercial buildings and a target for energy savings through use of energy-efficient light sources along with other...

  11. Trends in Commercial Buildings--Introduction

    U.S. Energy Information Administration (EIA) Indexed Site

    series of surveys in each sector reveals the trends in energy use for the sector. Introduction The Commercial Buildings Energy Consumption Survey (CBECS) collects data from a...

  12. Tribal Nations & the United States: An Introduction

    Broader source: Energy.gov [DOE]

    NCAI's Tribal Nations & the United States: An Introduction report provides a basic overview of the history and underlying principles of tribal governance.

  13. Introduction to Bayesian methods in macromolecular crystallography...

    Office of Scientific and Technical Information (OSTI)

    Title: Introduction to Bayesian methods in macromolecular crystallography Authors: Terwilliger, Thomas C 1 + Show Author Affiliations Los Alamos National Laboratory Publication ...

  14. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  15. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  16. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  17. Chapter_14_Cyber_Security

    Office of Environmental Management (EM)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  18. Chapter_3_Personnel_Security

    Office of Environmental Management (EM)

    Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is

  19. Hallmark Fact Sheet.cdr

    Energy Savers [EERE]

    Cryptographic Serial Communication Hallmark Cryptographic Serial Communication A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide secure serial communications for existing and new energy control systems A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide secure serial communications for existing and new energy control systems Cyber Security for Energy Delivery Systems Electricity Delivery &

  20. DOE Focus Areas and Panel Introduction

    Energy Savers [EERE]

    energy performance and lighting quality, but also a growing list of other benefits Big Data, Analytics Safety and Security Service-based business models Revenue streams...

  1. DOE Focus Areas and Panel Introduction

    Energy Savers [EERE]

    other benefits Big Data, Analytics Safety and Security Service-based business models Revenue streams Productivity Health and Human factors Resource, Process Optimization 11...

  2. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  3. Security Clearances; Limitations

    Energy Savers [EERE]

    SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term

  4. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land - Surrounded by 4,500 square

  5. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  6. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  7. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  8. Introduction to applications and industries for Microelectromechanical

    Office of Scientific and Technical Information (OSTI)

    Systems (MEMS). (Conference) | SciTech Connect Introduction to applications and industries for Microelectromechanical Systems (MEMS). Citation Details In-Document Search Title: Introduction to applications and industries for Microelectromechanical Systems (MEMS). Microelectromechanical Systems (MEMS) have gained acceptance as viable products for many commercial and government applications. MEMS are currently being used as displays for digital projection systems, sensors for airbag deployment

  9. Procurement Division Introduction | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Procurement Division Procurement Division Introduction Travel and Conference Services Careers/ Human Resources Directory Environment, Safety & Health Furth Plasma Physics Library Lab Leadership Organization Chart Technology Transfer Contact Us Business Operations Procurement Division Procurement Division Introduction Travel and Conference Services Careers/ Human Resources Directory Environment, Safety & Health Furth Plasma Physics Library Lab Leadership Organization Chart Technology

  10. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  11. NNSA/CEA Cooperation in Computer Science | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Computing NNSA/CEA Cooperation in Computer Science Introduction On March 13, 2002 Directors of the DOE/National Nuclear Security Administration (NNSA) and the Commissariat à L'Energie Atomique (CEA) signed an International Agreement to formalize and strengthen Cooperation in Computing Sciences. Since then technical staff members from NNSA National Laboratories [Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL) and Sandia National

  12. U.S. Department of Energy National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    2011 EEO Report of Accomplishments U.S. Department of Energy National Nuclear Security Administration Office of Civil Rights 3rd Edition Issued: March 2012 EEO and Diversity - Collaborating for Mission Success 2011 NNSA Office of Civil Rights Accomplishment Report 1 FY 2011 Year-End Report Table of Contents Page 1.0 Introduction .................................................................................. 3 1.1 Message from the EEO Manager ........................................ 3 1.2

  13. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  14. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  16. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  17. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  18. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  20. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  1. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  4. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  5. Nevada National Security Site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS Related News NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site NNSS celebrates its 65 anniversary NNSA Conducts Fifth Experiment aimed to Improve U.S. Ability to Detect Foreign

  6. nevada national security site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nevada national security site NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... NNSS celebrates its 65 anniversary The Nevada National Security Site (NNSS)

  7. Y-12 National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Campus Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  8. Introduction to Scientific I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scientific I/O Show All | 1 2 3 4 5 6 | Next » Introduction to Scientific I/O Table of Contents Introduction to Scientific I/O The Lustre File System The HDF5 Library Parallel HDF5 Scientific I/O in HDF5 Optimizations for HDF5 on Lustre Introduction to Scientific I/O I/O is commonly used by scientific applications to achieve goals like: storing numerical output from simulations for later analysis; implementing 'out-of-core' techniques for algorithms that process more data than can fit in system

  9. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  10. Secure key storage and distribution

    DOE Patents [OSTI]

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  11. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tools Security Minutes New! SIMP Late Reporting Social Media Email Association Official Use Only (OUO) Majordomo Email List Risks Email Vacating Spaces Reporting Monitors Review and Approval Top of page

  12. Asian Energy Security

    SciTech Connect (OSTI)

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of regional coordination on energy issues in Northeast Asia. The paragraphs below summarize Nautilus' plans for the AES project in the coming months.

  13. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  14. April 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

  15. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  16. Enforcement Letter, Lawrence Livermore National Security, LLC...

    Office of Environmental Management (EM)

    Security, LLC - May 2008 Enforcement Letter, Lawrence Livermore National Security, LLC - May 2008 May 15, 2008 Issued to Lawrence Livermore National Security, LLC related to the...

  17. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  18. Technical Security Program - DOE Directives, Delegations, and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  19. Security Enforcement Documents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Documents Available for Download September 23, 2015 Enforcement Letter, Los Alamos National Security, LLC Security Enforcement Letter issued to Los Alamos National Security, LLC ...

  20. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Energy Savers [EERE]

    18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS More Documents & Publications ADM 18 PDF Security, Emergency Planning & Safety Records Security, Emergency Planning &...