National Library of Energy BETA

Sample records for introduction scada security

  1. Introduction SCADA Security for Managers and Operators | Department of

    Energy Savers [EERE]

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector PDF icon Introduction SCADA Security for Managers and Operators More Documents & Publications Intermediate SCADA Security Training Course Slides

  2. Framework for SCADA Security Policy

    Office of Environmental Management (EM)

    Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear

  3. Framework for SCADA Security Policy (October 2005)

    Broader source: Energy.gov [DOE]

    Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate...

  4. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector ...

  5. National SCADA Test Bed - Enhancing control systems security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

  6. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  7. Secure SCADA Communication ProtocolPerformance Test Results | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. PDF icon Secure SCADA

  8. Intermediate SCADA Security Training Course Slides (September 2006) |

    Energy Savers [EERE]

    Department of Energy Intermediate SCADA Security Training Course Slides (September 2006) Intermediate SCADA Security Training Course Slides (September 2006) Presentation for Intermediate SCADA Security, SS-2 SANS SCADA Summit, September 28-29, 2006. The class enabled attendees to develop an understanding of tools and methods that can be used to discover and identify system vulnerabilities (CIP-005 R3.2, CIP-005 R4, & CIP-007 R8); develop mitigation strategies for resolving these issues

  9. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Environmental Management (EM)

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber ...

  10. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Center for SCADA Security Assets - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  11. Cyber Assessment Methods for SCADA Security

    Office of Environmental Management (EM)

    5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition,

  12. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Energy Savers [EERE]

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. PDF icon Lessons Learned from Cyber

  13. Hallmark Project Commercialization of the Secure SCADA Communications

    Energy Savers [EERE]

    Protocol, a cryptographic security solution for device-to-device communication | Department of Energy Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy

  14. Cyber Assessment Methods for SCADA Security | Department of Energy

    Energy Savers [EERE]

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  15. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment at National SCADA Test Bed | Department of Energy and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE)

  16. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E.; Duggan, David P.; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  17. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  18. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  19. 21 Steps to Improve Cyber Security of SCADA Networks | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Steps to Improve Cyber Security of SCADA Networks 21 Steps to Improve Cyber Security of SCADA Networks Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation's critical infrastructure and require protection from a variety of threats that exist in

  20. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Environmental Management (EM)

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  1. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  2. Quantifying Availability in SCADA Environments Using the Cyber Security Metric MFC

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Rabai, Latifa Ben Arfa; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2014-01-01

    Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost.

  3. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  4. Lessons Learned from Cyber Security Assessments of SCADA and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM ...

  5. Microsoft Word - PNNL-17118 Secure SCADA hadley SSCP FINAL with no ouo.doc

    Office of Environmental Management (EM)

    8 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability under Contract DE-AC05-76RL01830 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied,

  6. Sandia Energy - Research and Development of Next Generation Scada...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Next Generation Scada Systems Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric...

  7. ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber...

    Broader source: Energy.gov (indexed) [DOE]

    of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in ... Security Assessment at National SCADA Test Bed More Documents & Publications Security ...

  8. SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... How to Partner Small Business Vouchers Pilot at ... Before SCADA, "you had to send people around the plants to ... operational systems in hydroelectric dams; water treatment ...

  9. National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SCADA Testbed - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear

  10. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers

  11. National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)

    Broader source: Energy.gov [DOE]

    Improving the security of energy control systems has become a national priority. Since the mid-1990s, security experts have become increasingly concerned about the threat of malicious cyber...

  12. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... SCADA Images Since 1999, Sandia has conducted numerous assessments of SCADA and process control systems in hydroelectric dams; water treatment systems; electric power transmission, ...

  13. Review of Supervisory Control and Data Acquisition (SCADA) Systems

    SciTech Connect (OSTI)

    Reva Nickelson; Briam Johnson; Ken Barnes

    2004-01-01

    A review using open source information was performed to obtain data related to Supervisory Control and Data Acquisition (SCADA) systems used to supervise and control domestic electric power generation, transmission, and distribution. This report provides the technical details for the types of systems used, system disposal, cyber and physical security measures, network connections, and a gap analysis of SCADA security holes.

  14. Microsoft Word - Utilities Form Consortium to Fund SCADA Testing_v3.doc

    Office of Environmental Management (EM)

    ABB and Energy Utilities Form Consortium to Fund SCADA/EMS Cyber Security Assessment at National SCADA Test Bed Twelve utilities have formed a consortium with ABB, a supervisory control and data acquisition (SCADA) system vendor, to privately fund advanced research and testing through the U.S. Department of Energy's (DOE) National SCADA Test Bed (NSTB), announced a recent article in the journal Transmission & Distribution World. The utilities, located in the United States and Australia, will

  15. "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vol 7 No 8 | Department of Energy "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. The security and safety of transportation, water, communications,

  16. SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  17. SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  18. SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    History - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  19. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Testbeds - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  20. National SCADA Test Bed Fact Sheet

    Office of Environmental Management (EM)

    PROTECTING ENERGY INFRASTRUCTURE BY IMPROVING THE SECURITY OF CONTROL SYSTEMS Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in

  1. DOE National SCADA Test Bed Program Multi-Year Plan | Department of Energy

    Energy Savers [EERE]

    National SCADA Test Bed Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan This document presents the National SCADA Test Bed Program Multi-Year Plan, a coherent strategy for improving the cyber security of control systems in the energy sector. The NSTB Program is conducted within DOE's Office of Electricity Delivery and Energy Reliability (OE), which leads national efforts to modernize the electric grid, enhance the security and reliability of the energy infrastructure,

  2. Sandia Energy - SCADA History

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to make decisions as well as human support to maintain the information system. In other words, they were expensive. At the same time, SCADA systems were not as expensive as...

  3. National Supervisory Control and Data Acquisition (SCADA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supervisory Control and Data Acquisition (SCADA) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste

  4. U.S. DOE/OE National SCADA Test Bed Supports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. DOE/OE National SCADA Test Bed Supports U.S. DOE/OE National SCADA Test Bed Supports To help advance the U.S. Department of Energy (DOE) National SCADA Test Bed's (NSTB) efforts to enhance control system security in the energy sector, DOE's Office of Electricity Delivery and Energy Reliability (OE) recently awarded a total of nearly $8 million to fund five industry-led projects: Hallmark Project. (PDF 789 KB) Will commercialize the Secure SCADA Communications Protocol (SSCP), which marks

  5. SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013

    SciTech Connect (OSTI)

    Gordon Rueff; Lyle Roybal; Denis Vollmer

    2013-01-01

    There is a significant need to protect the nations energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INLs research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on how to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate non-normal traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.

  6. DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan | Department of

    Energy Savers [EERE]

    Energy OE National SCADA Test Bed Fiscal Year 2009 Work Plan DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan This document is designed to help guide and strengthen the DOE/OE NSTB program's research and development (R&D) of advance security tools and to heighten awareness among energy sector partners of the more than 30 NSTB projects underway in FY2009. PDF icon DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan More Documents & Publications National SCADA Test Bed -

  7. National SCADA Test Bed | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cybersecurity Energy Delivery Systems Cybersecurity National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind ...

  8. Real-Time SCADA Cyber Protection Using Compression Techniques

    SciTech Connect (OSTI)

    Lyle G. Roybal; Gordon H Rueff

    2013-11-01

    The Department of Energys Office of Electricity Delivery and Energy Reliability (DOE-OE) has a critical mission to secure the energy infrastructure from cyber attack. Through DOE-OEs Cybersecurity for Energy Delivery Systems (CEDS) program, the Idaho National Laboratory (INL) has developed a method to detect malicious traffic on Supervisory, Control, and Data Acquisition (SCADA) network using a data compression technique. SCADA network traffic is often repetitive with only minor differences between packets. Research performed at the INL showed that SCADA network traffic has traits desirable for using compression analysis to identify abnormal network traffic. An open source implementation of a Lempel-Ziv-Welch (LZW) lossless data compression algorithm was used to compress and analyze surrogate SCADA traffic. Infected SCADA traffic was found to have statistically significant differences in compression when compared against normal SCADA traffic at the packet level. The initial analyses and results are clearly able to identify malicious network traffic from normal traffic at the packet level with a very high confidence level across multiple ports and traffic streams. Statistical differentiation between infected and normal traffic level was possible using a modified data compression technique at the 99% probability level for all data analyzed. However, the conditions tested were rather limited in scope and need to be expanded into more realistic simulations of hacking events using techniques and approaches that are better representative of a real-world attack on a SCADA system. Nonetheless, the use of compression techniques to identify malicious traffic on SCADA networks in real time appears to have significant merit for infrastructure protection.

  9. Strengthening Cyber Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector ...

  10. Production Facility SCADA Design Report

    SciTech Connect (OSTI)

    Dale, Gregory E.; Holloway, Michael Andrew; Baily, Scott A.; Woloshun, Keith Albert; Wheat, Robert Mitchell Jr.

    2015-03-23

    The following report covers FY 14 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production facility. The goal of this effort is to provide Northstar with a baseline system design.

  11. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control...

  12. Research and Development of Next Generation Scada Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Development of Next Generation Scada Systems - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste

  13. ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) ABB SCADA/EMS System INEEL Baseline Summary Test Report (November 2004) This document covers the security evaluation of the "baseline" or "as delivered" system performed in the Idaho National Engineering and Environmental Laboratory (INEEL) SCADA test bed as part of the Critical Infrastructure Test Range Development Program, which is funded by the U.S. Department of Energy; Office of

  14. Sandia Energy - SCADA FAQs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FAQs Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and...

  15. Introduction

    Office of Environmental Management (EM)

    Introduction After the Office of Environmental Management (EM) completes environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers responsibility for any long-term stewardship (LTS) activities to the Landlord Program Secretarial Office (LPSO). LPSOs for current on-going mission sites include the Office of Science (SC), Office of Nuclear Energy (NE), and the National Nuclear Security Administration (NNSA). The LPSO includes the LTS as part of the

  16. Introduction to SCADA Protection and Vulnerabilities

    SciTech Connect (OSTI)

    Ken Barnes; Briam Johnson; Reva Nickelson

    2004-03-01

    Even though deregulation has changed the landscape of the electric utility industry to some extent, a typical large electric utility still owns power generation facilities, power transmission and distribution lines, and substations. Transmission and distribution lines form the segments or spokes of a utilitys grid. Power flow may change through these lines, but control of the system occurs at the nodes of the grid, the generation facilities, and substations. This section discusses each of these node types in more detail as well as how each is controlled.

  17. A Nuclear Family: Extras - Introduction | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... A Nuclear Family: Extras - Introduction The mp4 video format is not supported by this browser. Download video Captions: On Time: 6:59 min. D. Ray Smith, Y-12 historian,...

  18. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  19. SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  20. SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear

  1. SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear

  2. "Supervisory Control and Data Acquisition (SCADA) Systems." The...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 "Supervisory Control and Data Acquisition (SCADA) Systems." The CIP Report. Vol 7 No 8 ...

  3. National SCADA Test Bed | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity » Energy Delivery Systems Cybersecurity » National SCADA Test Bed National SCADA Test Bed Created in 2003, the National SCADA Test Bed (NSTB) is a one-of-a-kind national resource that draws on the integrated expertise and capabilities of the Argonne, Idaho, Lawrence Berkeley, Los Alamos, Oak Ridge, Pacific Northwest, and Sandia National Laboratories to address the cybersecurity challenges of energy delivery systems. Core and Frontier Research The NSTB core capabilities combine a

  4. Metrics for the National SCADA Test Bed Program

    SciTech Connect (OSTI)

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  5. The Center for SCADA Security Assets

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  6. Sandia Energy - SCADA Program Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Overview Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  7. Sandia Energy - SCADA Engineering Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering Solutions Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National...

  8. Sandia Energy - SCADA Training Courses

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Cyber Security for Electric Infrastructure National Supervisory...

  9. Introduction

    Office of Environmental Management (EM)

    Introduction After the Office of Environmental Management (EM) completes environmental cleanup at a site which continues to have a Department of Energy (DOE) mission, EM transfers...

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nonproliferation Test and Evaluation Complex (NPTEC) is the world's largest facility for open air testing of hazardous toxic materials and biological simulants. It is located at the Nevada National Security Site on Frenchman Flat, a natural geological basin approximately 75 miles northwest of Las Vegas. The topography, wind predictability, and location provide a secure, controlled environment for small and large-scale testing, which is governed by an approved Environmental Assessment. An

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Criticality Experiments Research Center (NCERC) is located at the Nevada National Security Site (NNSS) and operated by Los Alamos National Laboratory (LANL). NCERC maintains a substantial special nuclear material (SNM) inventory and expertise to support a variety of nuclear security missions, including nuclear criticality safety research and training, nuclear emergency response, nuclear nonproliferation, and support for other Government Agencies that require hands-on access to

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic age that not only affected national security, but national culture as well. Today it is known as the Nevada National Security Site (NNSS). Testing Captures America's Attention The Ranger test

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    December 18, 1950, President Harry S. Truman authorized the establishment of a continental testing site on a 680-square mile section of the Nellis Air Force Gunnery and Bombing Range. First known as the Nevada Proving Grounds, it officially became the Nevada Test Site in 1955, opening the door to an atomic testing age that not only affected national security, but national culture as well. Today it is called the Nevada National Security Site (NNSS). The Ranger test series At the commencement of

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prehistoric cultural resources are abundant on the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), indicating Native Americans occupied the region for more than 10,000 years. Historic artifacts from the late nineteenth and early twentieth centuries are also present, reflecting use by miners, ranchers, and settlers who traveled through the area. The U.S. Department of Energy National Nuclear Security Administration Nevada Field Office (NNSA/NFO) is committed to

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    To increase the domestic preparedness to combat terrorist threats, the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Offce (NNSA/NFO) provides a unique radiological/nuclear weapons of mass destruction (WMD) training center at the Nevada National Security Site (NNSS), located 65 miles northwest of Las Vegas, Nevada. At the NNSS, emergency responders are trained to take immediate, decisive actions in response to terrorist use of radiological or nuclear WMDs, such

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    do Ruth, Dixie, Shasta, Butternut, Seersucker, and Mink all have in common? They were all names of nuclear tests conducted at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS), between 1951 and 1962. A total of 928 atmospheric and underground nuclear tests was conducted at the NTS, and each of those tests was christened with a name. Background Beginning with Trinity, the first atomic test in 1945, nuclear tests were all assigned code names as a security measure

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    52 feet tall, it remains a well-known, highly visible landmark at the Nevada National Security Site (NNSS). It is the modular tower built for Icecap, a joint United Kingdom, Los Alamos National Laboratory underground nuclear test scheduled for the spring of 1993. What was scheduled to be the 929th test came to a halt when President Bush signed the Underground Nuclear Testing Moratorium on October 3, 1992. The tower still remains in Area 7 of the Nevada National Security Site. The Icecap tower

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Starting in 1951, thousands of military personnel from all four U.S. military services received orders to serve with the U.S. Army's Atomic Maneuver Battalion working at Camp Desert Rock at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). A Step Back in Time It is hard to imagine that in the 1950s the Nevada National Security Site host- ed a bustling military camp full of young soldiers, marines, sailors and airmen who were to witness the heat and blast of the

  19. Introduction

    National Nuclear Security Administration (NNSA)

    March 2010 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas, NV 89193-8518 phone: 702-295-3521 fax: 702-295-0154 email: nevada@nv.energy.gov

  20. Introduction

    National Nuclear Security Administration (NNSA)

    January 2011 For more information, contact: U.S. Department of Energy National Nuclear Security Administration Nevada Site Office Office of Public Affairs P.O. Box 98518 Las Vegas, NV 89193-8518 phone: 702-295-3521 fax: 702-295-0154 email: nevada@nv.doe.gov

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technical Reference on Hydrogen Compatibility of Materials Introduction Prepared by: C. San Marchi, Sandia National Laboratories, Livermore CA Editors C. San Marchi B.P. Somerday Sandia National Laboratories This report may be updated and revised periodically in response to the needs of the technical community; up-to-date versions can be requested from the editors at the address given below or downloaded at http://www.ca.sandia.gov/matlsTechRef/. The content of this report will also be

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    x Introduction April 1, 2011 - March 31, 2012 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2011 through March 31, 2012. The format follows that of previous years. Sections I through IV contain reports from individual research projects. Operation and technical developments are given in Section V. Section VI lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ix Introduction April 1, 2012 - March 31, 2013 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2012 through March 31, 2013. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and the Appendix gives additional information

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    xi Introduction April 1, 2013 - March 31, 2014 Progress in research and operations at the Texas A&M Cyclotron Institute is summarized in this report for the period April, 1, 2013 through March 31, 2014. The format follows that of previous years. Sections I through III contain reports from individual research projects. Operation and technical developments are given in Section IV. Section V lists the publications with Cyclotron Institute authors and outside users and the Appendix gives

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to the Open Source PV LIB for Python Photovoltaic System Modelling Package Robert W. Andrews 1 , Joshua S. Stein 2 , Clifford Hansen 2 , and Daniel Riley 2 1 Calama Consulting, Toronto, Ontario, M5T1B3, Canada 2 Sandia National Laboratories, Albuquerque, NM, 87185, USA Abstract-The proper modeling of Photovoltaic(PV) systems is critical for their financing, design, and operation. PV LIB provides a flexible toolbox to perform advanced data analysis and research into the performance

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public Involvement Survey - 2 2012 Hanford Public Involvement Survey - 3 Introduction The Tri-Party Agreement (TPA) agencies - U.S. Department of Energy (DOE), U.S. Environmental Protection Agency, and the Washington State Department of Ecology - work together on cleanup of the Hanford Site. Hanford is a 586-square-mile site in southeastern Washington created in 1943 as part of the Manhattan Proj- ect to produce plutonium for nuclear weapons. The production mission ended in the late 1980s. More

  7. Introduction

    Office of Environmental Management (EM)

    - 1 - Revision 3 Tribal Discussions on Implementation of the Section 180(c) Grant Program Annotated Outline and Appendices January 19, 2006 Preliminary Draft - For Discussion Purposes Only - 2 - Revision 3 INTRODUCTION The U.S. Department of Energy (DOE) seeks increased input from Tribal nations and tribal groups regarding the design of the Section 180(c) financial assistance program. The attached annotated outline and discussion papers serve as a communication tool to aid the discussions

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Construction began on the Device Assembly Facility (DAF) in the mid-1980s to support underground nuclear testing. DAF was designed and built to consolidate all nuclear explosive assembly functions, to provide safe structures for high explosive and nuclear explosive assembly operations, and to provide a state-of-the-art safeguards and security environment. Now that the United States is under a continuing nuclear testing moratorium, the DAF now provides support for Stockpile Stewardship

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U1a facility is an underground laboratory used for subcritical experiments; physics experiments that are used to obtain technical information about the U.S. nuclear weapons stockpile. These experiments support the U.S. Department of Energy, National Nuclear Security Administration's (NNSA) Stockpile Stewardship Programs, created to maintain the safety and reliability of the U.S. nuclear weapons stockpile. The U1a borehole was originally excavated in the 1960s for an underground nuclear test that

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Big Explosives Experimental Facility (BEEF) is a hydrodynamic testing facility, located at the Nevada National Security Site (NNSS), about 65 miles northwest of Las Vegas. BEEF provides data, through explosive experiments, to support the Stockpile Stewardship Program, along with a variety of new experimental programs that expand the nation's non-nuclear experiment capabilities. History When the U.S. Department of Energy's Lawrence Livermore National Laboratory (LLNL) facility in Livermore,

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    mid-1950s the United States launched a nuclear rocket program called Project Rover. The Atomic Energy Commission (AEC) and the National Aeronautics and Space Administration's (NASA) Space Nuclear Propulsion Office jointly administered the test area, later called the Nuclear Rocket Development Station (NRDS) in Area 25 of the Nevada Test Site (now known as the Nevada National Security Site (NNSS)). NRDS was a sprawling complex composed of test cells and assembly buildings. Connecting these

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Between 1951 and 1992, 828 underground nuclear tests were conducted in specially drilled vertical holes, vertical shafts, and horizontal tunnels at the Nevada Test Site, now known as the Nevada National Security Site (NNSS). Most vertical shaft tests assisted in the development of new weapon systems. Horizontal tunnel tests occurred to evaluate the effects (radiation, ground shock) of various weapons on military hardware and systems. Background Between 1951 and 1963, a total of 100 atmospheric

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Since the beginning of the industrial revolution the amount of carbon dioxide (CO 2 ) in the atmosphere has risen sharply and has the potential to dramatically affect global climate. It is important to determine how deserts and semiarid lands, which comprise nearly 40 percent of the Earth's land mass, will respond to the effects of this increase in CO 2 and related climate change. Collaborative ecological studies are being conducted at the Nevada National Security Site (NNSS), formerly known as

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    work at the Nevada National Security Site (NNSS), formerly known as the Nevada Test Site (NTS), requires the use of underground tunnels and shafts. In order to provide the safest work environment possible for NNSS workers, Mine Rescue Teams (MRTs) are required to ensure proper rescue services in an emergency situation. Background The MRTs must comply with Mine Safety and Health Administration (MSHA) requirements and with stipulations that include a requirement for a minimum of two MRTs to be

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    During the height of operations in the 1960s, the Jackass & Western Railroad, located in Area 25 of the Nevada National Security Site (NNSS), formerly know as the Nevada Test Site (NTS), was the shortest and slowest operating railroad in the United States. However, it was the railroad's important mission that made it such: the railroad trans- ported research reactors, NERVA reactors/ nuclear engines, and equipment between facilities at the NTS Nuclear Rocket Development Station (NRDS) in

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nevada National Security Site (NNSS) provides a unique and indispensable extension of the national laboratories' experimental capabilities in support of the Stockpile Stewardship Program. In addition to ongoing environmental cleanup of historic nuclear research and testing areas on the NNSS, non-defense research and development activities are conducted in cooperation with universities, industries, and other federal agencies. In the beginning After the first nuclear test at the Trinity Site in

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Five of the first six nuclear tests conducted by the United States occurred in the far reaches of the Pacific Ocean. Almost immediately, scientists and military planners discovered that logistics, weather, security and safety concerns required the need for a continental test site. The effort of transporting, supplying and housing a nuclear test task force in the middle of the Pacific was more than originally anticipated. In addition to the communist insurgency in Korea, the need for a

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For more than 50 years, the Nevada Test Site, now known at the Nevada National Security Site (NNSS), has been used as a test bed for a multitude of scientific projects, among which was the Supersonic Low-Altitude Missile (SLAM). The concept was a revolutionary new type of propulsion originated at Lawrence Radiation Laboratory, which eventually became Lawrence Livermore National Laboratory: nuclear ramjet power. Project Pluto was the code name for the project, which also referred to the weapon

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Before Neil Armstrong stepped foot on the moon on July 20, 1969, Armstrong, and astronauts Dick Gordon, Buzz Aldrin, Dave Scott, and Russell "Rusty" Schweikart left their footprints on the Nevada Test Site, now known as the Nevada National Security Site (NNSS) as part of their lunar training. Training Mission Their three-day visit began on February 16, 1965. It was the first training mission by a group of astronauts from the National Aeronautics and Space Administration (NASA). Their

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    earliest media reports of atmospheric nuclear testing in Nevada were based on eyewitness accounts. News reporters considered it a sign of importance when invited to watch detonations from News Nob, a large pile of volcanic tuff situated on the edge of Yucca Lake at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Thousands of newsmen trekked to observe and write about atomic mushroom clouds billowing above the desert of Nevada in the 1950s. Their articles were eagerly

  1. Introduction

    National Nuclear Security Administration (NNSA)

    U1a Complex is an underground laboratory used for subcritical experiments; physics experiments that obtain technical information about the U.S. nuclear weapons stockpile. These experiments support the U.S. Department of Energy, National Nuclear Security Administration's (NNSA) Stockpile Stewardship Programs, created to maintain the safety and reliability of the U.S. nuclear weapons stockpile. The U1a borehole was originally excavated in the 1960s for an underground nuclear test that was later

  2. Introduction

    National Nuclear Security Administration (NNSA)

    Construction began on the Device Assembly Facility (DAF) in the mid-1980s to support underground nuclear testing. DAF was designed and built to consolidate all nuclear explosive assembly functions, to provide safe structures for high explosive and nuclear explosive assembly operations, and to provide a state-of-the-art safeguards and security environment. Now that the United States is under a continuing nuclear testing moratorium, the DAF now supports diverse users such as Lawrence Livermore

  3. Introduction

    National Nuclear Security Administration (NNSA)

    Big Explosives Experimental Facility (BEEF) is a hydrodynamic testing facility, located at the Nevada National Security Site (NNSS), about 65 miles northwest of Las Vegas. BEEF provides data, through explosive experiments, to support the Stockpile Stewardship Program, along with a variety of new experimental programs that expand the nation's non-nuclear experiment capabilities. History When the U.S. Department of Energy's Lawrence Livermore National Laboratory (LLNL) facility in Livermore,

  4. Introduction

    Office of Environmental Management (EM)

    Introduction EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Policy and Logistical Challenges to Smart Grid Implementation." EnerNOC is a leading provider of demand response and energy efficiency solutions to utilities, Independent System Operators ("ISOs") and customers in the commercial, industrial and institutional ("CI&I") sectors. EnerNOC uses near real-time

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    rare occasions, vertical drill holes have been used for effects tests at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). Huron King was a Vertical Line of Site (VLOS) underground test conducted at the Nevada Test Site on June 24, 1980 by the Defense Nuclear Agency, now the Defense Threat Reduction Agency (DTRA), U.S. Department of Defense. Background DTRA, in cooperation with the U.S. Department of Energy, and its predecessor, the Atomic Energy Commission, began

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mercury, Nevada, a town 65 miles northwest of Las Vegas, is the gateway to the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). There is no evidence as to how Mercury was named, but legend says that an unknown miner worked in the Calico Hills in the 1850s mining mercury- bearing ore. His route of travel became known as the Mercury Road, and the area surrounding it became known as Mercury. Almost one hundred years later the Atomic Energy Commission (AEC) built

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The desert temperature hovered at 90 degrees Fahrenheit the morning of July 17, 1962 at the Nevada Test Site (NTS), now known at the Nevada National Security Site (NNSS). Eventually the beating sun would increase the heat to over 105 degrees later that day, but at 10:00 a.m., a crowd of 396 spectators braved the scorching temperature and relentless sun to witness the last atmospheric test ever conducted by the United States. The crowd gathered in Area 18 of the NTS, approximately two miles from

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Larger than the state of Rhode Island, the Nevada National Security Site (NNSS) occupies approximately 1,375-square miles (approximately 880,000 acres) in southern Nevada, making it one of the largest restricted-access areas in the United States. The NNSS is surrounded by approximately 6,500 square miles of federal land used for the U.S. Air Force Nevada Test and Training Range, and the Desert National Wildlife Refuge. Located approximately 65 miles northwest of Las Vegas, the NNSS is vast,

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Age spanned from the 1940s through the 1990s. Key occurrences during that period, including events that precipitated the era and crucial milestones along the way, are documented in this timeline. An important part of the nuclear age occurred at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). Between 1951 and 1992 a total of 928 nuclear tests were conducted at the NTS, 828 of which were underground. A total of 126 nuclear tests were conducted at other

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the use of atomic energy. The concept moved from theory to reality in the mid-1950s when the United States launched a nuclear rocket program called Project Rover. A nuclear reactor and test engines were located in the southwest corner of the Nevada Test Site, now known at the Nevada National Security Site (NNSS). The Atomic

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    first nationally televised nuclear shot, "Annie" was conducted on March 17, 1953. Annie was also part of a civil effects test named Operation Cue, conducted by the Federal Civil Defense Administration (FCDA). On May 5, 1955 a 29-kiloton device named Apple 2 was detonated from a 500- foot tower on Yucca Flat at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), approximately 65 miles northwest of Las Vegas. It was the second nationally televised nuclear test

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    527 feet, the BREN (Bare Reactor Experiment -- Nevada) Tower was the largest free- standing structure west of the Mississippi River. It was also one of the best known and most visible landmarks at the Nevada Test Site, now known at the Nevada National Security Site (NNSS). It was taller than the Empire State Building (1,454 feet, to top of lightening rod) and almost twice as tall as the Eiffel Tower (1,063 feet, with antenna). It was constructed of 51 thirty-foot sections of high tensile steel

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 26, 1957, a safety experiment called Pascal-A was detonated in an underground hole at the Nevada Test Site (NTS), now known as the Nevada National Security Site (NNSS). The test, although successful, brought the issue of drilling to the forefront. The need to drill large-diameter holes at the NTS resulted from the Limited Test Ban Treaty (LTBT), signed by President John F. Kennedy in Moscow on August 5, 1963. The LTBT prohibited testing nuclear weapons in the atmosphere, underwater, and in

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    May 25, 1953, during the Operation Upshot-Knothole test series at the Nevada Test Site, now known at the Nevada National Security Site (NNSS), a milestone occurred in ordnance development. A 280-mm cannon, nicknamed Atomic Annie, fired the first and last nuclear projectile as part of the Grable test. The MK-9 artillery shell was propelled a distance of seven miles. It exploded in the air and had a yield of 15 kilotons (15,000 tons of TNT). Deployment Two 280-mm cannons were shipped by rail from

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    diverse and complex mosaic of plant and animal communities are found at the Nevada National Security Site. Representative of both the Mojave and Great Basin deserts, approximately 1,500 ani- mal species, including 924 species of insects, and 750 different kinds of plants are documented at the site. The varying elevations and climatic conditions at the test site contribute to the distribution of plant and animal communities. On the south end of the site, Jackass Flats lies at a low 2,688 feet

  16. Transmission and Distribution World March 2007: DOE Focuses on Cyber Security

    Broader source: Energy.gov [DOE]

    Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed. 

  17. Good practice guide on firewall deployment for SCADA and process control networks

    Office of Environmental Management (EM)

    FIREWALL DEPLOYMENT FOR SCADA AND PROCESS CONTROL NETWORKS GOOD PRACTICE GUIDE 15 FEBRUARY 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) - a predecessor organisation to the Centre for the Protection of National Infrastructure (CPNI). Hyperlinks in this document may refer to resources that no longer exist. Please see CPNI's website (www.cpni.gov.uk) for up-to-date information. Disclaimer Reference to any specific commercial product,

  18. Use of SCADA Data for Failure Detection in Wind Turbines

    SciTech Connect (OSTI)

    Kim, K.; Parthasarathy, G.; Uluyol, O.; Foslien, W.; Sheng, S.; Fleming, P.

    2011-10-01

    This paper discusses the use of existing wind turbine SCADA data for development of fault detection and diagnostic techniques for wind turbines.

  19. Good Practice Guide on Firewall Deployment for SCADA and Process...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both...

  20. National SCADA Test Bed Substation Automation Evaluation Report (Technical

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Report) | SciTech Connect National SCADA Test Bed Substation Automation Evaluation Report Citation Details In-Document Search Title: National SCADA Test Bed Substation Automation Evaluation Report × You are accessing a document from the Department of Energy's (DOE) SciTech Connect. This site is a product of DOE's Office of Scientific and Technical Information (OSTI) and is provided as a public service. Visit OSTI to utilize additional information resources in energy science and technology.

  1. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  2. Quantitative Cyber Risk Reduction Estimation Methodology for a Small Scada Control System

    SciTech Connect (OSTI)

    Miles A. McQueen; Wayne F. Boyer; Mark A. Flynn; George A. Beitel

    2006-01-01

    We propose a new methodology for obtaining a quick quantitative measurement of the risk reduction achieved when a control system is modified with the intent to improve cyber security defense against external attackers. The proposed methodology employs a directed graph called a compromise graph, where the nodes represent stages of a potential attack and the edges represent the expected time-to-compromise for differing attacker skill levels. Time-to-compromise is modeled as a function of known vulnerabilities and attacker skill level. The methodology was used to calculate risk reduction estimates for a specific SCADA system and for a specific set of control system security remedial actions. Despite an 86% reduction in the total number of vulnerabilities, the estimated time-to-compromise was increased only by about 3 to 30% depending on target and attacker skill level.

  3. Hallmark Project Commercialization of the Secure SCADA Communications...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Increased connectivity and automation in the control systems that manage the nation's energy infrastructure have improved system functionality, but left systems more vulnerable to ...

  4. Security is Not an Option | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other industries. Here's a look at progress to date. PDF icon Security is Not an Option More Documents & Publications Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE National SCADA Test Bed Program Multi-Year Plan National SCADA Test Bed - Enhancing control systems security

  5. Basic SCADA systems - from the sensors to the screen

    SciTech Connect (OSTI)

    Merlie, B.

    1995-12-01

    Supervisory Control and Data Acquisition (SCADA) Systems are specialized control systems used to monitor and control facilities which are geographically dispersed. They are commonly used in the gas, oil, electric, and water transmission and distribution industries. SCADA systems differ from other control systems in that they make extensive use of remote communications and are more tolerant to outages of the communications network than a typical control system installation in a plant environment. A basic SCADA system can be broken into five functional parts. These are: (1) Sensors and Actuators; (2) Remote Terminal Units (RTUs); (3) Communications Facilities; (4) Host Computer Systems; and (5) User Interfaces While the fundamental concepts of SCADA systems have changed little in the past 20 years, more sophisticated hardware and software has altered some of the traditional paradigms associated with these control systems. This is particularly true with respect to RTUs, host computer systems, and user interfaces. While this paper will focus on the fundamentals, it will attempt to provide the reader with current trends in the industry where applicable.

  6. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  7. Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks

    Broader source: Energy.gov [DOE]

    In recent years, Supervisory Controls and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial information technologies for both...

  8. Parris Island Wastewater Treatment Plant SCADA Upgrades Final Report

    SciTech Connect (OSTI)

    Meador, Richard J.; Hatley, Darrel D.

    2004-03-18

    Marine Corp Recruit Depot (MCRD), Parris Island, SC, home of the Easter Recruiting Region Marine Corp Boot Camp, found itself in a situation common to Department of Defense (DOD) facilities. It had to deal with several different types of installed energy-related control systems that could not talk to each other. This situation was being exacerbated by the installation of a new and/or unique type of control system for every new building being constructed or older facility that was being upgraded. The Wastewater Treatment Facility (WWTF) and lift station controls were badly in need of a thorough inspection and a new Supervisory Control and Data Acquisition (SCADA) system upgrade to meet environmental, safety, manpower, and maintenance concerns. A project was recently completed to implement such a wastewater treatment SCADA upgrade, which is compatible with other upgrades to the energy monitoring and control systems for Parris Island buildings and the Pacific Northwest National Laboratory (PNNL) Decision Support for Operations and Maintenance (DSOM) system installed at the Central Energy Plant (CEP). This project included design, specification, procurement, installation, and testing an upgraded SCADA alarm, process monitoring, and display system; and training WWTF operators in its operation. The ultimate goal of this and the other PNNL projects at Parris Island is to allow monitoring and control of energy and environmental components from a central location.

  9. Securing Wide Area Measurement Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Wide Area Measurement Systems Securing Wide Area Measurement Systems This report documents an assessment of wide area measurement system (WAMS) security conducted by Pacific Northwest National Laboratory (PNNL) as a project funded by the National SCADA Test Bed Program in cooperation with the Department of Energy's Transmission Reliability Program. With emphasis on cyber security, this report also addresses other categories of risk and vulnerability including equipment reliability, data quality

  10. Evaluating resilience of DNP3-controlled SCADA systems against event buffer flooding

    SciTech Connect (OSTI)

    Yan, Guanhua; Nicol, David M; Jin, Dong

    2010-12-16

    The DNP3 protocol is widely used in SCADA systems (particularly electrical power) as a means of communicating observed sensor state information back to a control center. Typical architectures using DNP3 have a two level hierarchy, where a specialized data aggregator device receives observed state from devices within a local region, and the control center collects the aggregated state from the data aggregator. The DNP3 communication between control center and data aggregator is asynchronous with the DNP3 communication between data aggregator and relays; this leads to the possibility of completely filling a data aggregator's buffer of pending events, when a relay is compromised or spoofed and sends overly many (false) events to the data aggregator. This paper investigates how a real-world SCADA device responds to event buffer flooding. A Discrete-Time Markov Chain (DTMC) model is developed for understanding this. The DTMC model is validated by a Moebius simulation model and data collected on real SCADA testbed.

  11. OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts OPC Security Whitepaper #3Hardening Guidelines for OPC Hosts In recent years, Supervisory Control and Data Acquisition (SCADA), process control and industrial manufacturing systems have increasingly relied on commercial Information Technologies (IT) such as Ethernet(tm), Transmission Control Protocol/Internet Protocol (TCP/IP) and Windows® for both critical and non-critical communications. This has made the interfacing

  12. Microsoft Word - 4March08_SCADA_Procurement.doc

    Office of Environmental Management (EM)

    INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance INL/EXT-06-11516 Revision 3 Cyber Security Procurement Language for Control Systems Version 1.8 Sponsor: Department of Homeland Security, National Cyber Security Division Contributors: Idaho National Laboratory, State of New York Multi-State Information Sharing Analysis Center (MSISAC), System Audit Network Security (SANS) February 2008 DISCLAIMER This report was prepared as an account of work sponsored

  13. SLURM Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SLURM Introduction SLURM Introduction SLURM (Simple Linux Utility For Resource Management) is a very powerful open source, fault-tolerant, and highly scalable resource manager and...

  14. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop

    SciTech Connect (OSTI)

    Baily, Scott A.; Dalmas, Dale Allen; Wheat, Robert Mitchell; Woloshun, Keith Albert; Dale, Gregory E.

    2015-11-16

    The following report covers FY 15 activities to develop supervisory control and data acquisition (SCADA) system for the Northstar Moly99 production prototype gas flow loop. The goal of this effort is to expand the existing system to include a second flow loop with a larger production-sized blower. Besides testing the larger blower, this system will demonstrate the scalability of our solution to multiple flow loops.

  15. National SCADA Test Bed Substation Automation Evaluation Report

    SciTech Connect (OSTI)

    Kenneth Barnes; Briam Johnson

    2009-10-01

    Increased awareness of the potential for cyber attack has recently resulted in improved cyber security practices associated with the electrical power grid. However, the level of practical understanding and deployment of cyber security practices has not been evenly applied across all business sectors. Much of the focus has been centered on information technology business centers and control rooms. This report explores the current level of substation automation, communication, and cyber security protection deployed in electrical substations throughout existing utilities in the United States. This report documents the evaluation of substation automation implementation and associated vulnerabilities. This evaluation used research conducted by Newton-Evans Research Company for some of its observations and results. The Newton Evans Report aided in the determination of what is the state of substation automation in North American electric utilities. Idaho National Laboratory cyber security experts aided in the determination of what cyber vulnerabilities may pose a threat to electrical substations. This report includes cyber vulnerabilities as well as recommended mitigations. It also describes specific cyber issues found in typical substation automation configurations within the electric utility industry. The evaluation report was performed over a 5-month period starting in October 2008

  16. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on security through obscurity. Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. Cyber crime has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group has something to prove. Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be on the front line if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utilitys SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values even results from a SIEM (Security Information and Event Management) system. When the system deviates from normal, CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSMs built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that real world training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipients SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  17. Attendee Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N ... (REI) Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's ...

  18. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  19. OIC Introduction

    Energy Savers [EERE]

    OIC Introduction David McCall Chair - OIC Liaison Task Group Senior Strategic Planner - Intel Corporation Constrained Devices The Internet of Things 2 Data Centers Cloud Rich...

  20. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect (OSTI)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  1. ADA/SCADA RTU protocol based on the 3-layer UCA model

    SciTech Connect (OSTI)

    Adamo, V.P.

    1995-12-31

    This paper describes an implementation of a DA/SCADA RTU communication protocol based on the 3-layer reference model for wide area networks specified in the Utility Communications Architecture (UCA) VL1.0. This protocol is based on the following international standards: EIA-232-D, High-level Data Link Control (HDLC) [ISO/IEC 3309], and Manufacturing Message Specification (MMS) [ISO/IEC 95061]. A description of the HDLC frame structure used in this implementation is provided. This includes a description of the extended transparency option for Start/Stop transmission, commonly referred to as {open_quotes}asynchronous HDLC{close_quotes}. This option allows for the transmission of HDLC frames using inexpensive asynchronous communication hardware. The data link topology described in this paper is an unbalanced, point-to-multipoint topology consisting of one primary, or, master station, and multiple secondary, or remote, stations. The data link operates in the Normal Response Mode (NRM). In this mode a secondary station may initiate transmissions only as a result of receiving explicit permission to do so from the primary station. The application layer protocol described in this paper is an implementation of the Manufacturing Message Specification (MMS). The MMS device model, or Virtual Manufacturing Device (VMD), for a DA/SCADA Remote Terminal Unit is provided. The current VMD model provides a view of common RTU data types, plus, A/C Input (ACI) data including phasor magnitude and mean readings, harmonics, and overcurrent alarm information.

  2. Introduction - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hero Image ©bobpaz.com0082.JPG Research Research Introduction Thrusts Library Resources Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database JCAP seeks to discover new ways to produce hydrogen and carbon-based fuels using only sunlight, water and carbon dioxide as inputs Why Solar FuELs?

  3. SCADA Testbeds

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  4. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  5. Attendee Introduction

    Office of Environmental Management (EM)

    Managing Legacy Materials at WETF LA-UR-13-22476 Tritium Focus Group April, 2013 Roy Michelotti WFO-WETF LANL Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA U N C L A S S I F I E D The "T Buck" Stopped at WETF  Experimental items and process equipment were generated at WETF, or sent to WETF from other LANL facilities and offsite locations, for testing or unloading, and tritium processing: * Bulk gas or hydride storage containers, * Used

  6. Digital field-bus mode SCADA is key to offshore efficiency. [Automation of offshore gas production platforms

    SciTech Connect (OSTI)

    Cuthbert, P. )

    1994-02-01

    An all-digital SCADA network has been installed in one of the North Sea's largest natural gas fields, controlling the delivery of gas from Shell UK Exploration and Production's souther-area fields to a British Gas Terminal at Bacton, UK. The innovative use of digital technology -- based on the industry-standard HART field protocol -- to complete a digital communications link stretching from the onshore SCADA host right out to the process variable transmitters on the platforms, is playing a key role in the automation of the monitoring and control system by allowing Shell UK Expro to run the majority of the platforms unmanned. The SCADA system is part of a major refit being carried out by Shell Expro on its Leman field. The refit is part of the company's long-term strategy to extend the lifetime of this established field, which started operations in the late 1960s. In order to meet this goal, the prime requirements are to reduce operational costs and risk exposure, and the key element in this area was to reduce the need for resident staff and all of their associated support and equipment costs, through the deployment of automation. The system will achieve the project's cost-cutting aims, but also break new ground in control and monitoring technology for the gas industry, through the use of a smart transmitter scheme as a digital field communications within the wide-area network, using the protocol's all-digital capability in preference to the commonly used 4-20mA-compatible mode, will allow real-time monitoring and control, plus maintenance and diagnostics, to take place remotely. This paper describes the design of this system.

  7. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  8. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  9. Microsoft PowerPoint - SS1_4H_NERC_Training_09_28_06.ppt

    Office of Environmental Management (EM)

    Introduction SCADA Security for Managers and Operators September 28, 29, 2006 2 SANS SCADA Security Summit II September 28, 29, 2006 Disclaimer * References made herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the U.S. Government, any agency thereof, or any company affiliated with the Idaho National Laboratory. * Use the described security

  10. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  11. Management of Naval Reactors' Cyber Security Program, OIG-0884

    Broader source: Energy.gov (indexed) [DOE]

    FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Naval Reactors' Cyber Security Program" INTRODUCTION AND OBJECTIVE The Naval...

  12. 1. INTRODUCTION | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1. INTRODUCTION 1. INTRODUCTION PDF icon 1. INTRODUCTION More Documents & Publications Tribal Comments Database OIEPP Letter on Roundtable Sessions ICEIWG Meeting Agenda: May 29, 201

  13. Introduction and overview

    SciTech Connect (OSTI)

    None, None

    2009-01-18

    The Renewable Energy Technology Characterizations introduction outlines describe the technical and economic status of the major emerging renewable energy options for electricity supply.

  14. Introduction to Vol. Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part I (1950-1987) An error occurred. Try watching this video on...

  15. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role:

  16. SMART GRID: an introduction. | Department of Energy

    Energy Savers [EERE]

    SMART GRID: an introduction. SMART GRID: an introduction. Our nation's electric power infrastructure that has served us so well for so long - also known as "the grid" - is rapidly running up against its limitations. Our lights may be on, but systemically, the risks associated with relying on an often overtaxed grid grow in size, scale and complexity every day. From national challenges like power system security to those global in nature such as climate change, our near-term agenda is

  17. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that ...

  18. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... September 2006 - NSTB summarizes lessons learned in a paper evaluating multiple SCADA assessments. September 2006 - NIST and NSTB assess impacts of antivirus software on industrial ...

  19. Microsoft Word - OE NSTB MYP_FINAL 052108.doc

    Office of Environmental Management (EM)

    Program Multi-Year Plan DOE National SCADA Test Bed Program Multi-Year Plan i Contents 1. INTRODUCTION ......................................................................................................................1 1.1 The Control Systems Security Imperative .................................................................1 1.2 Challenges to Secure Control Systems in the Energy Sector.....................................3 1.3 Roadmap to Secure Control Systems in the Energy Sector

  20. Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards

    Office of Environmental Management (EM)

    Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards Introduction As recent attacks, Presidential Executive Order for Improving Critical Infrastructure Cybersecurity, and Presidential Policy Directive 21 for Critical Infrastructure Security and Resilience have illustrated, managing security risks to our most important organizations and systems, including the electric grid, has become a national security priority. Enterprise security program

  1. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    From a Department of Defense (DoD) perspective, SMrs offer great advantage for energy security with stable fuel cost profiles, a secure installation for meeting base-load power demands with a robust, secured reactor design (i.e., energy security), potential to provide potable water and synthetic fuels, and a means to exceed DoD greenhouse gases (GhG) reduction goals. While presently SMrs are being proposed based on various reactor technologies, SMrs based on light-water reactor (lWr)

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  7. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    details, refer to the Map of Post 10 Truck Inspection Station (pdf). Resources Emergency Communication Vendor Security Requirements Material Frontiers in Science Lectures Mobile...

  8. Introduction to 'Make'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    'Make' Introduction to 'Make' Introduction The UNIX make utility facilitates the creation and maintenance of executable programs from source code. make keeps track of the commands needed to build the code and when changes are made to a source file, recompiles only the necessary files. make creates and updates programs with a minimum of effort. A small initial investment of time is needed to set up make for a given software project, but afterward, recompiling and linking is done consistently and

  9. Department of Homeland Security | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NISACDepartment of Homeland Security

  10. DNS as a Covert Channel Within Protected Networks | Department of Energy

    Office of Environmental Management (EM)

    DNS as a Covert Channel Within Protected Networks DNS as a Covert Channel Within Protected Networks This whitepaper discusses ways to detect DNS exfiltration attempts based on current known methods, and provides recommendations for mitigation of this exposure. PDF icon DNS as a Covert Channel Within Protected Networks More Documents & Publications ProActive DNS Blacklisting Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks Introduction SCADA Security for

  11. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security...

  12. Transmission and Distribution World March 2007: DOE Focuses on...

    Broader source: Energy.gov (indexed) [DOE]

    with national SCADA test bed. PDF icon Energy Secrtor Owners, operators and system vendors team up to boost control system security with national SCADA test bed More Documents & ...

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  14. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  15. Introduction.PDF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    III Comment Response Document September 1997 Department of Energy Carlsbad Area Office Carlsbad, New Mexico This Document Printed on Recycled Paper DOE/EIS-0026-S-2 COMMENT RESPONSE DOCUMENT TABLE OF CONTENTS TC-1 TABLE OF CONTENTS ACRONYMS AND ABBREVIATIONS ............................................................AC-1 INTRODUCTION .........................................................................................IN-1 1.0 ALTERNATIVES

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  17. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  18. Security Rulemaking

    Office of Environmental Management (EM)

    2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  20. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security Home/Water Security - Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation pumping, (d) drinking water, and (e) wastewater. Aggregate electricity use across these sectors (f) is also mapped. Permalink Gallery Sandians Recognized in Environmental Science & Technology's Best Paper Competition Analysis, Capabilities, Energy, Energy-Water Nexus, Global, Global,

  1. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security Home/Tag:Water Security - Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation pumping, (d) drinking water, and (e) wastewater. Aggregate electricity use across these sectors (f) is also mapped. Permalink Gallery Sandians Recognized in Environmental Science & Technology's Best Paper Competition Analysis,

  2. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  7. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  8. security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved within B 174. Use

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  16. Introduction to High Performance Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to High Performance Computing Introduction to High Performance Computing June 10, 2013 Photo on 7 30 12 at 7.10 AM Downloads Download File Gerber-HPC-2.pdf...

  17. National SCADA Testbed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab Photovoltaic Systems Evaluation Laboratory PV Regional ... Facility Geomechanics and Drilling Labs National ... Health Monitoring Offshore Wind High-Resolution ...

  18. Introduction to Control Part 1

    SciTech Connect (OSTI)

    Scheinker, Alexander

    2015-07-13

    Presentation that offers an introduction to Control Theory, sponsored by the Los Alamos National Laboratory, Low Level RF Control Group.

  19. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  20. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or...

  1. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ExcEptional sErvicE in thE national intErEst Investigating Containment Integrity Sandia is a nationally and internationally recognized leader in Nuclear Reactor containment research, supporting operations, lifetime extensions, and security and vulnerability assessments over a broad range of phenomena. Sandia's expertise includes evaluation of containment when subjected to high velocity impacts, enormous pressures and stresses, and attacks by saboteurs. Sandia's resources enable the completion of

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after 9/11. these comprehensive analyses were able to realistically represent the actual attack, the response of the facility to the

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  5. National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security LLNL's Terascale Simulation Facility houses the Department of Energy Advanced Scientific Computing (ASC) Program's Purple supercomputer, a 100-teraops (trillion operations per second) machine that is one of the fastest in the world. ASC Purple enables 3D simulations with high-fidelity physics models of the performance of a full nuclear weapon system. NIF can create conditions-temperatures of 100 million degrees and pressures 100 billion times that of the Earth's atmosphere-similar to

  6. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, ...

  7. Community Energy Strategic Planning - Introduction | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction Community Energy Strategic Planning - Introduction This presentation provides an introduction to the Community Energy Strategic Planning approach. PDF icon Community ...

  8. Introduction to Framework | Open Energy Information

    Open Energy Info (EERE)

    Introduction to Framework (Redirected from Introduction to Methodology) Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans,...

  9. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  10. Introduction: Regional Dialogue Contract Templates

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction: Regional Dialogue Contract Templates October 17, 2007 1. Summary * BPA invites comments on the first draft of the Regional Dialogue Master Template by Friday,...

  11. Introduction to BPA Film Collection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to BPA Film Collection: Volume One, Disc One, 1939-1954 An error occurred. Try...

  12. Secure ICCP IntegrationConsiderations and Recommendations | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy ICCP IntegrationConsiderations and Recommendations Secure ICCP IntegrationConsiderations and Recommendations The goal of this report is to identify the operation and implementation issues associated with the introduction of the secure form of the Inter-control Center Communications Protocol, or ICCP, formally referred to as IEC 60870-6-TASE.2, into the utility infrastructure. The report provides considerations and recommendations to assist a utility owner to advance the security of

  13. National Nuclear Security Administration Contractor Governance, IG-0881

    Office of Environmental Management (EM)

    National Nuclear Security Administration Contractor Governance DOE/IG-0881 February 2013 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 February 19, 2013 MEMORANDUM FOR THE ACTING ADMINISTRATOR, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "National Nuclear Security Administration Contractor Governance" INTRODUCTION Since July

  14. Building America Webinar: Introduction - Who's Successfully Doing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction - Who's Successfully Doing Deep Energy Retrofits? Building America Webinar: Introduction - Who's Successfully Doing Deep Energy Retrofits? This presentation provides...

  15. JOTG Video Introduction | Department of Energy

    Office of Environmental Management (EM)

    JOTG Video Introduction JOTG Video Introduction Addthis Description Greeting: Inter-Agency Partnership, Commitment, and Service to the American workers

  16. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  17. Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  18. Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  19. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized ...

  20. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in ...

  1. Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy's corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that

  2. Advancing Global Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  3. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration DOENV--325-Rev. lOa February 2015 Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear ...

  6. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  7. Introduction to ESPC ENABLE Program

    Broader source: Energy.gov [DOE]

    Webinar provides participants with an introduction to the Energy Savings Performance Contract (ESPC) ENABLE program, an overview of the process, and next steps on how to move forward with a project...

  8. Systems Analysis Workshop Welcome & Introductions

    Broader source: Energy.gov [DOE]

    Welcome and introduction to the DOE Systems Analysis Workshop held in Washington, D.C. July 28-29, 2004 to discuss and define role of systems analysis in DOE Hydrogen Program.

  9. Document Number Q0029500 Introduction

    Office of Legacy Management (LM)

    Introduction 1.0 Introduction This Remedial Investigation (RI) AddendumRocused Feasibility Study (FFS) report updates the 1998 final RI and presents the results of a FFS conducted for Operable Unit (OU) 111, contaminated surface water and ground water, of the Monticello Mill Tailings Site (MMTS). These documents are combined to promote better reference between the updated RI information and the remedy comparisons of the FFS. This document is prepared by the U.S. Department of Energy (DOE) Grand

  10. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  11. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  13. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Contact Courses Summer School Engineering Information Science, Technology Geophysics, Planetary Physics, Signatures Applied Geophysical Experiences Materials Design Calendar NSEC » Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5 665-1144 Email Energy Security Council The Los Alamos National Laboratory Energy Security

  14. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  15. Introduction to computers: Reference guide

    SciTech Connect (OSTI)

    Ligon, F.V.

    1995-04-01

    The ``Introduction to Computers`` program establishes formal partnerships with local school districts and community-based organizations, introduces computer literacy to precollege students and their parents, and encourages students to pursue Scientific, Mathematical, Engineering, and Technical careers (SET). Hands-on assignments are given in each class, reinforcing the lesson taught. In addition, the program is designed to broaden the knowledge base of teachers in scientific/technical concepts, and Brookhaven National Laboratory continues to act as a liaison, offering educational outreach to diverse community organizations and groups. This manual contains the teacher`s lesson plans and the student documentation to this introduction to computer course.

  16. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  17. Introduction

    Energy Savers [EERE]

    ... The results obtained from this project will provide useful guidelines for future design of ... 2) Using large scale classical molecular dynamics (MD) simulations, we have ...

  18. Introduction

    Energy Savers [EERE]

    ... IN 47906 Funding: 800,000 (10012014 - 09302017) Description of Project: The Fukushima nuclear accident of 2011 has highlighted the importance of designing safety-related ...

  19. Introduction

    Office of Environmental Management (EM)

    The idea to use atomic energy to propel a rocket for interplanetary travel originated in 1906 when American space pioneer Robert Goddard, a college sophomore, wrote a paper on the...

  20. Introduction

    Energy Savers [EERE]

    VP, Product Strategy Cree Yan Rodriguez VP, Product and Technology Acuity Brands Lighting Ed Clark Sustainable Strategist ZGF Architects Chris Bailey Dir. of Bus. Develop. & Prod....

  1. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3/2015 Jonathan L. Male Director, Bioenergy Technologies Office 2 | Bioenergy Technologies Office March 23-27, 2015, Hilton Mark Center Alexandria, VA 3 | Bioenergy Technologies Office I. Overview II. BETO's Goals and Mission III. 2015 Project Partners IV. Review By the Numbers V. Program Management Review VI. Changes Implemented in Response to the 2013 Peer Review Outline 4 | Bioenergy Technologies Office The Challenge and the Opportunity Biofuels could displace 30% of liquid transportation

  2. Introduction

    Broader source: Energy.gov (indexed) [DOE]

    Building Energy Efficiency Subcommittee to the Secretary of Energy Advisory Board November 6, 2012 Dr. J. Michael McQuade Matthew Rogers Dr. Arthur Rosenfeld Dr. Maxine Savitz...

  3. Introduction

    Office of Scientific and Technical Information (OSTI)

    REALTIME MONITORING OF PIPELINES FOR THIRD-PARTY CONTACT SEMI-ANNUAL TECHNICAL PROGRESS REPORT NO. 2 April 1, 2004-September 30, 2004 Principal Authors Gary L. Burkhardt, Staff Scientist Alfred E. Crouch, Staff Engineer Cooperative Agreement DE-FC26-03NT41878 Southwest Research Institute ® Project 14.10211 Submitting Organization Sensor Systems and NDE Technology Department Applied Physics Division Southwest Research Institute 6220 Culebra Road San Antonio, Texas 78238 Prepared for U.S.

  4. INTRODUCTION

    Office of Scientific and Technical Information (OSTI)

    ... Measurements of seedling density in 2005 indicated that Quercus spp. seedling density was higher than sapling density, but continued shading by taller plants will likely eliminate ...

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Workforce Survey Report For Savannah River Site Community Reuse Organization June 8, 2009 Booz | Allen | Hamilton SRSCRO Nuclear Workforce Survey Report T A B L E O F C O N T E N T S 1. Background And Objectives Of The Nuclear Workforce Survey 3 Background 3 Survey Objectives 4 2. Scope Of The Survey 5 Participating Companies 5 Nuclear Workers Demand Beyond The SRSCRO Region 6 Key Job Classifications 7 3. Survey Results 8 Growth In Total Staffing Levels 8 Estimated New Hires 2010 - 2020

  6. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 Prepared by: Michael G. Finn Science and Engineering Education Program Oak Ridge Institute for Science and Education December 2001 All opinions expressed in this paper are the author's and do not necessarily reflect policies and views of the U.S. Department of Energy or the Oak Ridge Institute for Science and Education. This document was prepared for the Division of Science Resources Studies of the National Science Foundation by the Oak Ridge Institute for Science and Education (ORISE)

  7. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mixed-phase clouds, such as those found in the Arctic have presented quite a challenge to the modeling com- munity. Without modification, models have struggled to maintain the delicate balance between liquid and ice that must exist in order to maintain these clouds for ex- tended time periods, as they are observed in the atmo- sphere. In conjunction with the ARM Cloud Modeling working group we are investigating the ability of the University of Wisconsin Non-Hydrostatic Modeling System (UW-NMS)

  8. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to TotalView Debugger Why a Debugger? * Developers need a way to understand the runtime behavior of their programs - When writing new code, porting code, adding features, scaling, tuning or optimizing - When troubleshooting bugs, code correctness, and memory analysis * The solution Rogue Wave has to this is TotalView - TotalView is a source code debugger for Linux, Unix and Mac which gives users visibility into and control over runtime execution - TotalView is especially compelling for users

  9. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Looking for historical information about the nuclear testing program? You can find records and information about the U.S. Department of Energy's (DOE) nuclear testing program at the Nuclear Testing Archive (NTA), located on East Flamingo Road in Las Vegas, Nevada. The facility, located adjacent to the Desert Research Institute and the University of Nevada Las Vegas, houses more than 375,000 documents in a 9,000-square-foot space equipped with special features for preserving the documents. The

  10. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiation is energy in the form of waves or particles. Although radiation is around us every day, you cannot see, hear, or smell it. Radiation is detected by measuring the activity of the energy released as it decays. It comes from natural and man-made sources as unstable atoms decay to form more stable atoms. Different Types of Radiation Alpha particles travel only a few inches in the air and lose energy almost as soon as they encounter an obstacle such as a sheet of paper or the outer layer of

  11. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    test base was established in the summer of 1946 on the shores of Salton Sea, California where Sandia Laboratory could conduct ballistic tests and monitor the operation of fuzing and firing systems. This area, then known as Sandy Beach, had been utilized by the Manhattan Project for ballistic and fuzing and firing testing of the first atomic weapons. Background The Salton Sea Test Base provided satisfactory range facilities for several years. However, by the mid-1950's, the atmosphere became

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    plant and animal life. The climate is arid, with an annual rainfall of six inches in the lower elevations, an ideal setting for the ignition of wildland fires. Wildland fires are not the only risks at the NNSS. Offices, facilities, and projects at the site are subject to a diverse range of operational risks and hazards that include the potential for significant emergencies. Background To mitigate these risks and provide protection for the surrounding public, personnel, and property at the NTS,

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    They are some of the most famous and eerie images to emerge from the Cold War: atmospheric nuclear tests captured one millisecond after detonation. Using a rapatronic camera developed by Harold Edgerton of Edgerton, Germeshausen & Grier Inc. (EG&G), a company specializing in electronic technology, the rapatronic camera was capable of photographing still images at the rate of 1/1,000,000 of a second. Background Dr. Harold Edgerton, a pioneer in strobe photography, developed the concept

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing Laboratory (RSL) is a center for creating advanced technologies that provides a broad range of scientific, technological, and operational disciplines with core competencies in emergency response operations and support, remote sensing, and applied science and technologies in support of counterterrorism and radiological incident response. Background The Atomic Energy Commission originally established the "Aerial Measurements Operations" at Nellis Air Force Base in Las

  15. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    an unassuming building located on Wonderland Avenue, five minutes from the famous Sunset Strip in Los Angeles, California, a secret film studio produced as many films as those of the major Hollywood studios, yet most of those films were unseen by the public. The mission of Lookout Mountain Air Force Station was to provide in-service production of classified motion picture and still photographs to the U.S. Department of Defense and the Atomic Energy Commission - later the U.S. Department of

  16. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    pre-dawn hours of January 24, 1978, a Canadian Mounted Police corporal located in Hay River, in the Canadian Northwest Territories, reported a meteor sighting. One hundred and twenty-fve miles north, in Yellowknife, a night janitor reported mysterious lights streaking across the darkened sky. What these eye-witnesses actually saw was the re-entry of the Soviet satellite Cosmos 954 into Earth's atmosphere. Background Cosmos 954 launched into orbit on September 18, 1977. The satellite was designed

  17. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U.S. Department of Energy (DOE) Offce of Science sponsors a range of science education initiatives through its Workforce Development for Teachers and Scientists program. Included within this program is the Science Bowl, a nationwide academic science competition established in 1991. Background National and Regional DOE Science Bowl competitions test students' knowledge in all areas of science and math. High school students are quizzed in a fast paced question-and-answer format similar to

  18. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    plant and animal life. The climate is arid, with an annual rainfall of six inches in the lower elevations, an ideal setting for the ignition of wildland fres. Background The NNSS Fire & Rescue (F&R) was established on October 9, 1951. Today, the F&R service provides fre suppression, emergency medical, hazardous materials (HAZMAT) mitigation, technical rescue response, incident command functions and fre prevention activities to the site on a 24-hour basis. Prevention Several

  19. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    What happens when you combine an accidental conventional explosion with the possibility of radiological contamination? You get a gigantic health and safety hazard. That health and safety hazard motivated the Sandia Corporation, now Sandia National Laboratories, to create a specialized structure in 1957 known as the Gravel Gertie, designed to prevent the release of radioactive particles into the atmosphere. The assembly cells, which have 12-inch thick concrete walls, are called Gravel Gerties

  20. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sedan Crater was formed on July 6, 1962, when the U.S. Atomic Energy Commission, predecessor of the U.S. Department of Energy, conducted an excavation experiment using a 104-kiloton thermonuclear device. The test, detonated 635 feet underground, helped develop technology for earth moving projects. The awe-inspiring explosion displaced about 12 million tons of earth, creating a crater 1,280 feet in diameter and 320 feet deep. The force of the detonation released seismic energy equivalent to an

  1. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Peter Skene Ogden, an Englishman on a Hudson Bay Company trapping expedition down the Humboldt River, was the first white man to enter northern Nevada. It was 1826, and Nevada was the last state to be explored by the white man. Until that time, Nevada had been inhabited by Paleo-Indians and migrants. During the same year, the famous trapper-explorer Jebediah Smith crossed the southern tip of the state on his way to California. The Old Spanish Trail, Nevada's oldest, was first traveled by

  2. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    June 6, 1958, the United States Atomic Energy Commission, now the U.S. Department of Energy (DOE), announced the Plowshare Program, named for the biblical injunction to ensure peace by "beating swords into plowshares." The program was designed as a research and development activity to explore the technical and economic feasibility of using nuclear explosives for industrial applications. President Dwight D. Eisenhower introduced the concept in his "Atoms for Peace" speech

  3. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Following the Trinity test and the bombings of Hiroshima and Nagasaki, military officials still knew very little about the effects, especially on naval targets, of nuclear weapons. Accordingly, the Joint Chiefs of Staff requested and received Presidential approval to conduct a test series during summer 1946. The test series, named Crossroads, was conducted at Bikini atoll in the Marshall Islands, which was far from population centers in the middle of the Pacific. Pacific testing offered ample

  4. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    November 1981, the last cattle roundup took place at the U.S. Department of Energy's (DOE) experimental farm, managed for DOE by the U.S. Environmental Protection Agency (EPA). Operations at this unique, 30-acre experimental farm in Area 15 started in 1964 when the EPA was contracted to conduct research to determine if radioactive materials (radionuclides) found in the environment were being transported to humans. At the time, a major concern was the transport of radioiodine through the

  5. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Peacekeeper (MX) is a four-stage intercontinental ballistic missile capable of carrying up to ten independently-targetable reentry vehicles with greater accuracy than any other ballistic missile. Its design combines advanced technology in fuels, guidance, nozzle design, and motor construction with protection against the hostile nuclear environment associated with land- based systems. Several Air Force Peacekeeper research and testing experiments took place from 1978 through 1982 in Area 25 of

  6. Introduction

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28

    The objective of this Guide is to improve the quality of cost estimates and further strengthen the DOE program/project management system. This Guide strives to achieve this goal by providing uniform cost estimating methods as well as consistent estimate terminology. No cancellation.

  7. Introduction

    Office of Scientific and Technical Information (OSTI)

    ... by Dr. Michael Moore at the Cancer Research Center, University of California, Berkeley. ... Michael Moore for synthesis of peptides, and to Prof. Franois Baneyx for providing ...

  8. Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Exposure Social *Energy Reliability (Diversification) *Energy Independence *Quality of Life *Community and Stakeholder Participation Environment *Climate Change *Mitigation ...

  9. Introduction

    Office of Environmental Management (EM)

    Electric Transmission in the West Planning  Siting  Issues February 7, 2012 2  What does Transmission Look Like?  Why is Transmission Important?  Transmission Planning  Transmission Siting  Select Transmission Issues  References Presentation Content © 2010 ICF International. All rights reserved. What does Transmission Look Like? © 2010 ICF International. All rights reserved. WHAT DOES ELECTRIC TRANSMISSION LOOK LIKE 4  Provide affordable/reliable electricity 

  10. Introduction

    Office of Environmental Management (EM)

    Advances in manufacturing technologies, including modular construction, improved factory and field fabrication and other innovative construction technologies, are essential to the future of nuclear energy. They are strategically important to the economics of new nuclear power plant construction in the United States and to the competitiveness of the U.S.in the nuclear energy market. In 2012, the Nuclear Energy Enabling Technologies (NEET) Program was initiated by the Department of Energy's

  11. Introduction

    Office of Environmental Management (EM)

    Nuclear energy systems employ instrumentation and controls to measure important system parameters, provide control input to components that maintain systems within desired and safe limits, and provide owners and operators with the needed awareness of plant conditions to plan and safely manage operational evolutions. In a sense, instrumentation and control (I&C) systems function as the nervous system of a nuclear power plant and other nuclear system applications. They monitor all aspects of

  12. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    When the Nevada Test Site was established in 1951, it provided a proving ground for a burgeoning U.S. nuclear weapons program. One hundred atmospheric nuclear tests occurred at the ...

  13. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1992, the President of the United States placed a moratorium on underground nuclear weapons testing. As a result, alternate experimental methods for certifying the nation's nuclear ...

  14. Introduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Modern nuclear weapons adopted 'sealed pit' designs in which all parts of the fission bomb were placed in their final configuration during assembly. This evolution created more ...

  15. Introduction

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-05-21

    Provides guidance for software engineering, project management, and quality assurance practices and procedures. Does not cancel other directives.

  16. INTRODUCTION

    National Nuclear Security Administration (NNSA)

    Los Alamos National Laboratory, an affirmative action/equal opportunity employer, is operated by the University of California for the U.S. Department of Energy under contract W-7405-ENG-36. By acceptance of this article, the publisher recognizes that the U.S. Government retains a nonexclusive, royalty- free license to publish or reproduce the published form of this contribution, or to allow others to do so, for U.S. Government purposes. Los Alamos National Laboratory requests that the publisher

  17. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for

  18. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  19. Strategic Security Infrastructure Program | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Strategic Security Infrastructure Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs

  20. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national...

  1. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    work; the Comprehensive Security Briefing, which is given when an individual first receives hisher security clearance; the Annual Security Refresher Briefing, which must be ...

  2. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  3. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  4. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  5. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Overview We are applying our unique scientific capabilities to the challenges of global climate change and energy security. 4 08 FACT SHEET Energy Security Overview 4 08 For more...

  6. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  7. Renewing America's Nuclear Power Partnership for Energy Security and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Economic Growth | Department of Energy Renewing America's Nuclear Power Partnership for Energy Security and Economic Growth Renewing America's Nuclear Power Partnership for Energy Security and Economic Growth October 8, 2008 - 4:14pm Addthis Remarks as Prepared for Delivery by Secretary Bodman Thank you, Jamie, for that kind introduction. And many thanks as well to Secretary Gutierrez, Deputy Secretary Sullivan and the entire Commerce team for convening this important event. As always, it's

  8. The Department's Unclassified Cyber Security Program - 2012, IG-0877

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information

  9. of Western Area Power Administration's Cyber Security Program

    Broader source: Energy.gov (indexed) [DOE]

    Western Area Power Administration's Cyber Security Program DOE/IG-0873 October 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 October 22, 2012 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Management of Western Area Power Administration's Cyber Security Program" INTRODUCTION AND OBJECTIVE The Department of Energy's

  10. Headquarters Facilities Master Security Plan

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The goal of the HQ Security Awareness Program is to assist Federal and contractor employees in understanding DOE security requirements, their individual security responsibilities, ...

  11. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  14. Lemnos Interoperable Security Program

    Office of Environmental Management (EM)

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  15. An introduction to coastal geomorphology

    SciTech Connect (OSTI)

    Pethick, J.S.

    1984-01-01

    This book is an introduction to wave and tidally dominated coastal forms, including beaches, cliffs, dunes, estuaries, mudflats and marshlands. The book emphasises the physical mechanisms by which this variety of landforms is produced and maintained. It introduces the energy outputs - waves, currents, tides - into the coastal 'machine', examines the way in which this energy is converted into water and sediment movement, and leads to an account of coastal landform development.

  16. Cookstoves Peer Review Session Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cookstoves Peer Review Session Introduction Elliott Levine Technology Manager Demonstration & Market Transformation March 26, 2015 2 | Bioenergy Technologies Office Global Alliance for Clean Cookstoves: The United States Commitment On September 21, 2010, Secretary of State Hillary Rodham Clinton announced the Global Alliance for Clean Cookstoves, a public-private partnership led by the United Nations Foundation, which focuses on creating a thriving global market for clean and efficient

  17. Introduction to Airborne Tritium Tritides

    Office of Environmental Management (EM)

    OVER 65 YEARS OF RADIATION DETECTION & MEASURMENT SOLUTIONS US NUCLEAR CORP INTRODUCTION AIRBORNE TRITIUM TRITIDES HYDRIDES - An Anion of Hydrogen Compounds containing hydrogen bonded to metals or metalloid may be referred to as hydrides A hydride is a compound formed by hydrogen and another, usually more electropositive, element or group. Almost all of the elements form binary compounds with hydrogen (exceptions being He, Ne, Ar, Kr, Pm, Os, Ir, Rn, Fr, and Ra). There are three main types

  18. II. GENERAL COMPLIANCE SUPPLEMENT INTRODUCTION

    Office of Environmental Management (EM)

    II. GENERAL COMPLIANCE SUPPLEMENT INTRODUCTION The objectives of most compliance requirements for DOE programs are generic in nature. For example, most programs have eligibility requirements. While the criteria for determining eligibility vary by program, the objective of the compliance requirement that only eligible entities participate is consistent across all programs. Rather than repeat these compliance requirements, audit objectives, and suggested audit procedures for each program, they are

  19. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks

  20. Safeguards and Security and Cyber Security RM | Department of Energy

    Energy Savers [EERE]

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. PDF icon Safeguards and Security and Cyber Security RM More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 Standard Review Plan -

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    material that it protects. Y-12 is the "Fort Knox" of uranium. We oversee the secure management and storage of strategic and special nuclear materials that have been removed...

  3. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone...

  4. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  5. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at

  6. International Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  7. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Physical Security Systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working

  8. Safeguards & Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    & Security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  9. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  10. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  11. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  12. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  13. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  14. Introduction to Renewable Energy Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to Renewable Energy Technology A YEAR-LONG SCIENCE & TECHNOLOGY COURSE by Matthew A. Brown Lakewood High School Lakewood, CO Lakewood High School Red Rocks Community College Smart Energy Living Alliance Metro Denver WIRED Initiative Introduction Page i-i Revision date: 6/1/08 This curriculum is a partnership between: Lakewood High School Matthew Brown, maabrown@jeffco.k12.co.us Suzanne McClung, smcclung@jeffco.k12.co.us 9700 W. 8th Ave., Lakewood, CO 80215 303.982.7096

  15. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. Procurement Division Introduction | Princeton Plasma Physics...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organization Business Operations Procurement Division Procurement Division Introduction Travel and Conference Services Careers Human Resources Directory Environment,...

  17. American Energy and Manufacturing Competitiveness Summit Introduction |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy American Energy and Manufacturing Competitiveness Summit Introduction American Energy and Manufacturing Competitiveness Summit Introduction Addthis Description Introduction video for the American Energy and Manufacturing Competitiveness Summit. Text Version Below is the text version for the American Energy and Manufacturing Competetitiveness Summit Introduction video. The video opens with an aerial city view as the sun rises, then cuts to time lapse photos of a highway

  18. Alarm Response Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Alarm Response Training Alarm Response Training The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:04 min. View an introduction to our Alarm Response Training, which prepares and trains personnel responding to civilian nuclear and radiological security alarms

  19. Introduction Airborne Tritium Tritides | Department of Energy

    Office of Environmental Management (EM)

    Introduction Airborne Tritium Tritides Introduction Airborne Tritium Tritides Presentation from the 33rd Tritium Focus Group Meeting held in Aiken, South Carolina on April 22-24, 2014. PDF icon Introduction Airborne Tritium Tritides More Documents & Publications DOE-HDBK-1129-2008 DOE-HDBK-1129-2007 DOE-HDBK-1129-99

  20. AIRMaster+ Tool Introduction | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tool Introduction AIRMaster+ Tool Introduction This presentation discusses typical compressed air system operation and discusses methods of system efficiency improvement through use of the AIRMaster+ and CAC LogTool software. PDF icon AIRMaster+ Introduction (May 15, 2007) More Documents & Publications Pre-In-Plant Training Webinar (Compressed Air): Presentation Slides Webinars AIRMaster+ Software Tool Brochure

  1. Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  2. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  3. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  4. Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  5. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the

  6. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  7. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  8. Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... security to House committees on two occasions.For more than 30 years, Sandia has applied performance-based methods for designing and evaluating physical protection systems (PPS). ...

  9. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  10. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  11. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  13. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  14. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  15. Provision of mobile and man-portable radiation detection equipment;
  16. Regional cooperation on safeguards...

  17. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  18. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  19. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  21. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  22. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  1. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  2. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L. (Idaho Falls, ID)

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  3. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  5. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  6. Incidents of Security Concern

    Office of Environmental Management (EM)

    NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY

  7. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  8. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  9. Securing energy assets and infrastructure 2007

    SciTech Connect (OSTI)

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  10. Information Security: Coordination of Federal Cyber Security Research and

    Energy Savers [EERE]

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unauthorized Password Change Vulnerability | Department of Energy 92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch

  12. Fuel Cell Technologies Program Multi-Year Research, Development and Demonstration (MYRDD) Plan - Section 1.0: Introduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction Multi-Year Research, Development and Demonstration Plan Page 1 - 1 Multi-Year Research, Development and Demonstration Plan Page 1 - 1 1.0 Introduction The U. S. Department of Energy's (DOE's or the Department's) hydrogen and fuel cell efforts are part of a broad portfolio of activities to build a competitive and sustainable clean energy economy to secure the nation's energy future. Reducing greenhouse gas emissions 80 percent by 2050 1 and eliminating dependence on imported fuel

  13. New institute promotes nuclear security | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to recently help establish the Institute for Nuclear Security, housed in UT's Howard H. Baker Jr. Center for Public Policy. "A few other universities have nuclear security...

  14. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ... Related Articles U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass ...

  15. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  16. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  17. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  18. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  19. Honoring Our Past, Securing Our Future | National Nuclear Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Library Fact Sheets Honoring Our Past, Securing Our Future Honoring Our Past, Securing Our Future Transforming a Cold War Nuclear Weapons Complex into a 21st Century ...

  20. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  1. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  2. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessmentcwdd2015-05-04T21:05:48+00:00 security Water Treatment Facility Definition Security is assuring that water sources and water distribution systems are...

  3. An Introduction to SAE Hydrogen Fueling Standardization

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to SAE Hydrogen Fueling Standardization Will James U.S. Department of Energy Fuel Cell Technologies Office 2 | Fuel Cell Technologies Office eere.energy.gov 2 Question and Answer * Please type your question into the question box hydrogenandfuelcells.energy.gov SAE INTERNATIONAL U.S. DOE WEBINAR: An Introduction to SAE Hydrogen Fueling Standardization SAE INTERNATIONAL PARTICIPANTS AND AGENDA 4 DOE WEBINAR: An Introduction to SAE Hydrogen Fueling Standardization *Will James -

  4. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of:  Title 32, CFR, Part 2001, Classified National Security Information  Executive Order 13526, Classified National Security Information  DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3  DOE Order 475.2A, Identifying Classified Information  DOE Order 475.1, Counterintelligence Program The Security Awareness

  5. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  6. 2013 SSL Market Introduction Workshop Presentations Posted

    Broader source: Energy.gov [DOE]

    DOE has posted the presentations and materials from the eighth annual Solid-State Lighting Market Introduction Workshop, held November 12-14 in Portland, OR.

  7. Introduction to Chemistry and Material Sciences Applications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Chem and MatSci Apps Introduction to Chemistry and Material Sciences Applications June 26, 2012 L ast edited: 2015-12-11 16:11:02...

  8. Introduction to Vol Two Part Two

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Information Act Investor Relations Library Privacy Publications Tribal Affairs Introduction to Volume Two, Part II (1950-1987) An error occurred. Try watching this video on...

  9. Introduction to SAE Hydrogen Fueling Standardization

    Broader source: Energy.gov [DOE]

    Download presentation slides and questions and answers from the DOE Fuel Cell Technologies Office webinar, Introduction to SAE Hydrogen Fueling Standardization, held on September 11, 2014.

  10. Introduction to Chemistry and Material Sciences Applications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Chem and MatSci Apps Introduction to Chemistry and Material Sciences Applications June 26, 2012 Last edited: 2016-02-01 08:06:38

  11. Types of Lighting in Commercial Buildings - Introduction

    U.S. Energy Information Administration (EIA) Indexed Site

    Introduction Lighting is a major consumer of electricity in commercial buildings and a target for energy savings through use of energy-efficient light sources along with other...

  12. Trends in Commercial Buildings--Introduction

    U.S. Energy Information Administration (EIA) Indexed Site

    series of surveys in each sector reveals the trends in energy use for the sector. Introduction The Commercial Buildings Energy Consumption Survey (CBECS) collects data from a...

  13. National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  14. Nuclear Security 101 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    101 | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  15. Nuclear Security Enterprise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Enterprise | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog

  16. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home / About

  17. Security Commodity Team | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Commodity Team | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  18. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    campus | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  19. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  20. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA

  1. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  2. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  3. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  4. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Information | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs

  5. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home

  6. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Forms | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets Newsletters Press Releases Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home /

  7. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  8. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  9. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  10. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  11. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  12. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  13. Nevada National Security Site

    Broader source: Energy.gov [DOE]

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  14. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  15. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  16. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits...

  17. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  19. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  1. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  2. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  3. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  4. DOE Focus Areas and Panel Introduction

    Energy Savers [EERE]

    energy performance and lighting quality, but also a growing list of other benefits Big Data, Analytics Safety and Security Service-based business models Revenue streams...

  5. DOE Focus Areas and Panel Introduction

    Energy Savers [EERE]

    other benefits Big Data, Analytics Safety and Security Service-based business models Revenue streams Productivity Health and Human factors Resource, Process Optimization 11...

  6. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NNSA orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to stop at the East and West Jemez Road "Vehicle Access Portals" (VAPs) for a vehicle check. December 21, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience,

  7. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  8. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  9. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW MEXICO, June 25, 2012-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos National

  10. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the Cold War. Few people may be aware of the older important cultural resources that exist throughout the site as well. Artifacts ranging from hundreds to thousands of years old are part of the NNSS cultural inventory. The NNSS' Cultural Resources Management Program has documented tools and dwellings associated with

  11. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    FOR IMMEDIATE RELEASE March 14, 2001 NNSA Organizational Redress Strengthens Path Forward John A. Gordon, Administrator for the National Nuclear Security Administration (NNSA) announced today his plan for organizing the NNSA within the U.S. Department of Energy. The planned actions will improve performance of the core mission to strengthen national security and reduce the global threat from weapons of mass destruction through applications of science and technology. The Administration celebrated

  12. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    20 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex Performance Period: October 2012 - September 2013 December 24, 2013 APPROVED FOR PUBLIC RELEASE This document has been approved for release to the public by: Name / Title: Scott A. Hawks, NPO Y-12 Classification Officer Date: 12/31/2013 NNSA Production Office, Y-12 Page 2 of 20 Executive Summary This

  14. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  15. Introduction to applications and industries for Microelectromechanical

    Office of Scientific and Technical Information (OSTI)

    Systems (MEMS). (Conference) | SciTech Connect Introduction to applications and industries for Microelectromechanical Systems (MEMS). Citation Details In-Document Search Title: Introduction to applications and industries for Microelectromechanical Systems (MEMS). Microelectromechanical Systems (MEMS) have gained acceptance as viable products for many commercial and government applications. MEMS are currently being used as displays for digital projection systems, sensors for airbag deployment

  16. Headquarters Security Quick Reference Book

    Broader source: Energy.gov [DOE]

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  17. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. PDF icon Building Performance Database (BPD) Security More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD)

  18. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process PDF icon Security Review Process More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  19. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  20. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  1. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FSO RESPONSIBILITIES FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Certificate of Non-Possession Form Periodic Security Review Guide for Sandia National Laboratories (SNL) Non-Possessing Contractor Facilities Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DE, Facility Security Officer Overview (Self-Study Course ) Duration: 3 days

  2. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About » Leadership, Governance » Los Alamos National Security, LLC Los Alamos National Security, LLC (LANS) The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact LANS, LLC Office (505) 606-0105 Four world-class organizations team to support delivery of NNSA's mission at the Lab Los Alamos National Security,

  3. LANL's Torres is NNSA Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANL's Torres is NNSA Security Professional of the Year April 8, 2011 LOS ALAMOS, New Mexico, March 8, 2011-Bartolo "Bart" Torres of Los Alamos National Laboratory's Associate Directorate for Safeguards and Security is the 2010 National Nuclear Security Administration Security Professional of the Year."I'm pleased to be named the 2010 contractor Security Professional of the Year," Torres said. "Receiving this award is an honor, and really something that must be shared

  4. Chapter_14_Cyber_Security

    Office of Environmental Management (EM)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  5. Chapter_3_Personnel_Security

    Office of Environmental Management (EM)

    Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is

  6. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS December 22, 2015 PSH-15-0067 - In the Matter of Personnel Security Hearing On December 22, 2015, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. During a personnel security interview in April 2014 and a credit report review, the Local Security Office (LSO) learned that the individual had a number of charge-off accounts totaling $14,941, as well as an outstanding collection

  7. Introduction to Scientific I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scientific I/O Show All | 1 2 3 4 5 6 | Next » Introduction to Scientific I/O Table of Contents Introduction to Scientific I/O The Lustre File System The HDF5 Library Parallel HDF5 Scientific I/O in HDF5 Optimizations for HDF5 on Lustre Introduction to Scientific I/O I/O is commonly used by scientific applications to achieve goals like: storing numerical output from simulations for later analysis; implementing 'out-of-core' techniques for algorithms that process more data than can fit in system

  8. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  9. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    40 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos National

  10. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  11. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  12. Security Clearances; Limitations

    Energy Savers [EERE]

    SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term

  13. Security, Safety and Health

    Energy Savers [EERE]

    8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest

  14. U.S. Department of Energy National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    2011 EEO Report of Accomplishments U.S. Department of Energy National Nuclear Security Administration Office of Civil Rights 3rd Edition Issued: March 2012 EEO and Diversity - Collaborating for Mission Success 2011 NNSA Office of Civil Rights Accomplishment Report 1 FY 2011 Year-End Report Table of Contents Page 1.0 Introduction .................................................................................. 3 1.1 Message from the EEO Manager ........................................ 3 1.2

  15. Introduction to Benchmarking: Starting a Benchmarking Plan

    Broader source: Energy.gov [DOE]

    Presentation for the Introduction to Benchmarking: Starting a Benchmarking Plan webinar, presented on February 21, 2013 as part of the U.S. Department of Energy's Technical Assistance Program (TAP).

  16. Introduction to APS | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to APS What is the APS? What is the APS? The Advanced Photon Source is a synchrotron light source that produces high-energy, high-brightness x-ray beams. The source is...

  17. PART ONE INTRODUCTION ARTICLE I. JURISDICTION

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3- PART ONE INTRODUCTION ARTICLE I. JURISDICTION 1. The U.S. Environmental Protection Agency (EPA), Region 10, enters into this Agreement pursuant to Section 120(e) of the...

  18. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  19. Introduction to Microelectromechanical Systems (MEMS) failure analysis.

    Office of Scientific and Technical Information (OSTI)

    (Conference) | SciTech Connect Introduction to Microelectromechanical Systems (MEMS) failure analysis. Citation Details In-Document Search Title: Introduction to Microelectromechanical Systems (MEMS) failure analysis. No abstract prepared. Authors: Walraven, Jeremy Allen Publication Date: 2010-08-01 OSTI Identifier: 1024452 Report Number(s): SAND2010-5841C TRN: US201119%%385 DOE Contract Number: AC04-94AL85000 Resource Type: Conference Resource Relation: Conference: Proposed for presentation

  20. Introduction to High Performance Computing Using GPUs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HPC Using GPUs Introduction to High Performance Computing Using GPUs July 11, 2013 NERSC, NVIDIA, and The Portland Group presented a one-day workshop "Introduction to High Performance Computing Using GPUs" on July 11, 2013 in Room 250 of Sutardja Dai Hall on the University of California, Berkeley, campus. Registration was free and open to all NERSC users; Berkeley Lab Researchers; UC students, faculty, and staff; and users of the Oak Ridge Leadership Computing Facility. This workshop

  1. Introduction to Radioecology | Environmental Radiation Protection

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Curriculum Introduction to Radioecology (3 hrs) Instructor: Gary Mills Course Description: This course will be an introduction to the fates and effects of radionuclides (radioactive isotopes) and their environmental impacts. The topics will include: natural and anthropogenic sources of radionuclides, the modes of their dispersal, accumulation, and sequestration in the environment, the physical and biological factors influencing their uptake, accumulation, and elimination by biota, and the

  2. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  3. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  5. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  7. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  8. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  10. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  11. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  12. Hallmark Fact Sheet.cdr

    Office of Environmental Management (EM)

    Cryptographic Serial Communication Hallmark Cryptographic Serial Communication A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide secure serial communications for existing and new energy control systems A cryptographic card and link module integrating the Secure SCADA Communications Protocol to provide secure serial communications for existing and new energy control systems Cyber Security for Energy Delivery Systems Electricity Delivery &

  13. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  14. The Smart Grid: An Introduction | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Grid: An Introduction The Smart Grid: An Introduction The Smart Grid: An Introduction. How a smarter grid works as an enabling engine for our economy, our environment and our future. PDF icon The Smart Grid: An Introduction More Documents & Publications SMART GRID: an introduction. WHAT THE SMART GRID MEANS TO AMERICANS HOW THE SMART GRID PROMOTES A GREENER FUTURE.

  15. Y-12 National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex NNSA labs and sites get girls excited about engineering NNSA workers across the nuclear security enterprise took advantage of "Introduce a girl to engineering day" to instill hundreds of young women with excitement for science, technology, engineering, Deputy Administrator Creedon participates in "Slip Simulator" training at Y-12 Slips, trips, and falls cause many injuries at Y-12 National Security Complex and the

  16. Headquarters Security Quick Reference Book Headquarters Security Quick Reference Book

    Office of Environmental Management (EM)

    Headquarters Security Quick Reference Book Headquarters Security Quick Reference Book ACRONYMS BAO Building Access Only CMPC Classified Matter Protection and Control CUI Controlled Unclassified Information FACTS Foreign Access Central Tracking System DOE Department of Energy E.O. Executive Order FOCI Foreign Ownership, Control or Influence FOIA Freedom of Information Act HSPD Homeland Security Presidential Directive HSS Office of Health, Safety and Security HQ Headquarters HQFMSP HQ Facilities

  17. Radiological Security Partnership | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiological Security ... Radiological Security Partnership The mp4 video format is not supported by this browser. Download video Captions: On Time: 4:36 min. This voluntary program provides government-funded security enhancements at sites with radioactive materials of concern

  18. CIP Report

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Featured in this month's issue of The CIP Report are Supervisory Control and Data Acquisition (SCADA) systems. SCADA systems monitor and control the processes of many of our Nation's infrastructures. fle security and safety of transportation, water, communications, and many other vital parts of our everyday lives all rely on SCADA systems. In this issue we look at some of the difierent SCADA systems and their applications. fle Thrst article provides an overview of George Mason University's

  19. Secure key storage and distribution

    DOE Patents [OSTI]

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  20. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tools Security Minutes New! SIMP Late Reporting Social Media Email Association Official Use Only (OUO) Majordomo Email List Risks Email Vacating Spaces Reporting Monitors Review and Approval Top of page

  1. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  2. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River ...

  3. What to Expect when being Processed for a Department of Energy Security Clearance or Access Authorization

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WHAT TO EXPECT WHEN BEING PROCESSED FOR A DEPARTMENT OF ENERGY SECURITY CLEARANCE OR ACCESS AUTHORIZATION INTRODUCTION This overview will help individuals new to the process understand what it means to obtain and maintain a Department of Energy (DOE) security clearance or access authorization. You are a part of a select group of individuals who are being considered for access to classified information maintained by DOE. WHAT IS CLASSIFIED INFORMATION? As you know, the protection of classified

  4. Chapter 3: Enabling Modernization of the Electric Power System Technology Assessment | Cyber and Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber and Physical Security Chapter 3: Technology Assessments Introduction As understanding of the threats facing the operation, components, and subsystems of the electric power system is gained, a need has emerged for improvements in grid security and resilience. The focus on resiliency implies that threats will not go away and that some attacks, in addition to natural events, will be carried out successfully. The objective is for the system and associated subsystems to be designed and operated

  5. Statement of Neile L. Miller Acting Undersecretary for Nuclear Security and Acting Administrator

    National Nuclear Security Administration (NNSA)

    Statement of Neile L. Miller Acting Undersecretary for Nuclear Security and Acting Administrator National Nuclear Security Administration U.S. Department of Energy on the Fiscal Year 2014 President's Budget Request Before the Subcommittee on Energy and Water Development Senate Committee on Appropriations April 24, 2013 INTRODUCTION Chairman Feinstein, Ranking Member Alexander, and distinguished members of the Subcommittee, thank you for having me here to discuss the President's Fiscal Year 2014

  6. Follow-up Audit of the Department's Cyber Security Incident Management Program, IG-0878

    Office of Environmental Management (EM)

    Department's Cyber Security Incident Management Program DOE/IG-0878 December 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 December 11, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "Follow-up Audit of the Department's Cyber Security Incident Management Program" INTRODUCTION AND OBJECTIVE The Department of Energy operates

  7. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  8. Technical Security Program - DOE Directives, Delegations, and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  9. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  10. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Energy Savers [EERE]

    18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS More Documents & Publications ADM 18 PDF Security, Emergency Planning & Safety Records Security, Emergency Planning &...

  11. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture PDF icon ...

  12. Office of Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and ...

  13. Control Systems Security Standards: Accomplishments And Impacts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Standards: Accomplishments And Impacts Control Systems Security Standards: ... strategies defined in the DOEDHS Roadmap to Secure Control Systems in the Energy Sector. ...

  14. Sandia National Laboratories: National Security Missions: Internationa...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Image We develop technologies to enhance the security of nuclear weapons and materials worldwide. We support negotiations and implementation of ...

  15. Asian Energy Security

    SciTech Connect (OSTI)

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of regional coordination on energy issues in Northeast Asia. The paragraphs below summarize Nautilus' plans for the AES project in the coming months.

  16. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  17. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  18. Secure computing for the 'Everyman'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure computing for the 'Everyman' Secure computing for the 'Everyman' If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. September 2, 2014 This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information

  19. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) and the Lawrence Berkeley National Laboratory (LBNL) have implemented a number of software and security controls to ensure the security of data stored in the Building Performance Database (BPD). These include: a) Raw data provided by data contributors is stored on a secure site. Access is provided on an as-needed basis only to LBNL staff actively working on the BPD. b) Only the database

  20. David Telles wins NNSA Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David Telles wins NNSA Security Professional of the Year award May 7, 2009 LOS ALAMOS, New Mexico, May 7, 2009 - David M. Telles, who leads Los Alamos National Laboratory's Vulnerability Analysis Office, received a 2008 National Nuclear Security Administration Security Professional of the Year award. NNSA administrator Tom D'Agostino said, "Our security professionals dedicate themselves to protecting some of the nation's most vital strategic assets, and in so doing, help advance broader

  1. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  2. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  3. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  4. transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  5. Introduction to HPC using GPUs July 11, 2013

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Introduction to HPC using GPUs July 11, 2013 Introduction to HPC using GPUs July 11, 2013 June 18, 2013 by Francesca Verdier Registration is open for a one-day class "Introduction...

  6. Introduction to CEMI Fact Sheet | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Introduction to CEMI Fact Sheet Introduction to CEMI Fact Sheet PDF icon Introduction to CEMI Fact Sheet 2015.pdf More Documents & Publications CEMI Days Factsheet Amped Up! Volume 1, No.2 Technologist in Residence Pilot: Informational Webinar

  7. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the option of evaluating equipment from Seagate/Xyratex.) Outline: The remainder of this report is structured as follows: - Section 1: Describes the growing importance of secure storage architectures and highlights some challenges for HPC. - Section 2: Provides background information on HPC storage architectures, relevant supporting technologies for secure storage and details on OpenStack components related to storage. Note, that background material on HPC storage architectures in this chapter can be skipped if the reader is already familiar with Lustre and GPFS. - Section 3: A review of protection mechanisms in two HPC filesystems; details about available isolation, authentication/authorization and performance capabilities are discussed. - Section 4: Describe technologies that can be used to bridge gaps in HPC storage and filesystems to facilitate...

  8. Nuclear Safeguards and Security Challenge:

    National Nuclear Security Administration (NNSA)

    Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards

  9. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  10. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Global Security 2009

    Energy Savers [EERE]

    523744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ($ Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon Activities 241 242 252 10 Mixed Oxide Fuel Fabrication Facility (MOX) 340 332 270 (62) Defense Nuclear Nonproliferation (DNN) 77 58 91 33 Federal Expenses 4.7 5.2 5.4 .2 Total Budget for NNSA at SRS 662.7 637.2 618.4 (18.8)

  13. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  14. ARM - Privacy and Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ARMPrivacy and Security About Become a User Recovery Act Mission FAQ Outreach Displays History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management Plan (PDF, 1.3MB) Field Campaign Guidelines (PDF, 574KB) ARM Climate Research Facility Expansion Workshop (PDF, 1.46MB) Facility Activities ARM and the Recovery Act Contributions to International Polar Year Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    19, 2001 Energy Department And University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for two of the Energy Department's defense labs, Lawrence Livermore and Los Alamos. The move expands and strengthens the contracts' requirements, and extends them for a three-year period. "This is a significant move

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    24, 2001 NNSA Cites Los Alamos National Laboratory For Nuclear Safety Violations The Department of Energy's National Nuclear Security Administration (NNSA) has cited the University of California for violations of nuclear safety rules at the Los Alamos National Laboratory (LANL) in New Mexico. The University of California operates LANL for the NNSA. The violations are described in a Preliminary Notice of Violation (PNOV), which was issued on January 19, 2001. The violations stem from several

  17. Securing Control Systems Modems

    Energy Savers [EERE]

    Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Pantex, LLC Performance Evaluation Report NNSA Production Office Pantex Plant Performance Period: October 2012 - September 2013 November 13, 2013 APPROVED FOR PUBLIC RELEASE This document has been approved for release to the public by: Name / Title: Del W. Kellogg, NPO Pantex Classification Officer Date: 01/06/2014 NNSA Production Office, Pantex 11-13-13 Page 2 of 15 IExecutive Summary This