National Library of Energy BETA

Sample records for mailing address secure

  1. Headquarters Program & Staff Office Mailing Addresses | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Headquarters Program & Staff Office Mailing Addresses Headquarters Program & Staff Office Mailing Addresses The following addresses are for delivery of regular mail and small packages: Delivery to the Headquarters buildings in Washington, DC: Name of Individual Title Routing Symbol/Forrestal Building U.S. Department of Energy 1000 Independence Ave., S.W. Washington, DC 20585 Name of Individual Title Routing Symbol/L'Enfant Plaza Building U.S. Department of Energy 1000

  2. Mailing Addresses and Information Numbers for Operations, Field, and Site

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Offices | Department of Energy About Energy.gov » Mailing Addresses and Information Numbers for Operations, Field, and Site Offices Mailing Addresses and Information Numbers for Operations, Field, and Site Offices Name Telephone Number U.S. Department of Energy Ames Site Office 111 TASF, Iowa State University Ames, Iowa 50011 515-294-9557 U.S. Department of Energy Argonne Site Office 9800 S. Cass Avenue Argonne, IL 60439 630-252-2000 U.S. Department of Energy Berkeley Site Office Berkeley

  3. Mailing Addresses for National Laboratories and Technology Centers |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mailing Addresses for National Laboratories and Technology Centers Mailing Addresses for National Laboratories and Technology Centers Name Telephone Number U.S. Department of Energy Albany Research Center 1450 Queen Ave. SW Albany, OR 97321-2198 541-967-5892 U.S. Department of Energy Ames Laboratory #311 TASF, Iowa State University Ames, Iowa 50011 515-294-2680 U.S. Department of Energy Argonne National Laboratory (East) 9700 S. Cass Avenue Argonne, IL 60439 630-252-2000

  4. Site Office Contracting Officer E-mail address Ames Site Office...

    National Nuclear Security Administration (NNSA)

    Site Office Contracting Officer E-mail address Ames Site Office Jackie York Jacquelyn.york@ch.doe.gov Argonne Site Office Jacquelyn York Jacquelyn.york@ch.doe.gov Brookhaven Site ...

  5. Addressing Security and Reliability Concerns of Large Power Transformers |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Services » Addressing Security and Reliability Concerns of Large Power Transformers Addressing Security and Reliability Concerns of Large Power Transformers Large power transformers (LPTs) are critical to the nation's power grid, with more than 90 percent of consumed power passing through high-voltage transformers at some point. LPTs, however, face a number of challenges that make them one of the most vulnerable components on the grid. They are expensive, difficult to

  6. Site Office Contracting Officer E-mail address Ames Site Office Jackie York Jacquelyn.york@ch.doe.gov

    National Nuclear Security Administration (NNSA)

    Site Office Contracting Officer E-mail address Ames Site Office Jackie York Jacquelyn.york@ch.doe.gov Argonne Site Office Jackie York Jacquelyn.york@ch.doe.gov Brookhaven Site Office Evelyn Landini Jennifer Hartmann elandini@bnl.gov jhartmann@bnl.gov Idaho Site Office Paul Allen allenph@id.doe.gov Kansas City Site Office Hilary Cole Hilary.Cole@nnsa.doe.gov Lawrence Livermore Site Office Jewell Lee Jewell.Lee@nnsa.doe.gov Los Alamos Site Office Barbara Romero Robert M. Poole

  7. Electronic Mail Analysis Capability

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-01-08

    Establishes the pilot program to test the Department of Energy (DOE) Electronic Mail Analysis Capability (EMAC), which will be used to monitor and analyze outgoing and incoming electronic mail (e-mail) from the National Nuclear Security Administration (NNSA) and DOE laboratories that are engaged in nuclear weapons design or work involving special nuclear material. No cancellation.

  8. Addressing Security and Reliability Concerns of Large Power Transforme...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    With the nation's security and economy dependent on the reliable delivery of electricity, ... a Joint Electromagnetic Pulse (EMP) Resilience Strategy for the grid and are now ...

  9. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  10. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  11. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    SciTech Connect (OSTI)

    Thomas D'Agostino

    2009-07-14

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  12. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  13. change_address_111609

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CHANGE OF ADDRESS and EMERGENCY NOTIFICATION TO: HUMAN RESOURCES DATE: Z# Social Security # Print First Name Print Middle Name or Initial Print Last Name (Currently in Payroll System) Complete appropriate changes: NAME CHANGE: Print Name Change to ADDRESS CHANGE: Mailing Address City State Zip TELEPHONE NUMBER CHANGE: FROM Area Code and # TO Area Code and # Cell Area Code and # Home phone Message phone EMERGENCY NOTIFICATION CHANGE: Name Relationship Day Phone Evening Phone Address City State

  14. Mail Services | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mail Management Memorandum, July 2, 2010 Mail Management Memorandum, July 2, 2010 Mail Management Memorandum prescribing policy and requirements for the effective, economical, and secure management of incoming, internal, and outgoing mail in Federal agencies. These requirements pertain to all DOE offices, and may also apply to national laboratories and other contractor facilities, depending on whether they qualify as Federal facilities as defined in the regulations. Mail Management Memorandum,

  15. Network Security Mechanisms Utilizing Dynamic Network Address Translation LDRD Project

    SciTech Connect (OSTI)

    PRICE, CARRIE M.; STANTON, ERIC; LEE, ERIK J.; MICHALSKI, JOHN T.; CHUA, KUAN SEAH; WONG, YIP HENG; TAN, CHUNG PHENG

    2002-11-01

    A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide an additional means in which networks, and the services that reside on them, can be protected from adversarial compromise. This report has a two-fold objective. First is to provide the reader with an overview of this emerging Dynamic Defenses technology using Dynamic Network Address Translation (Dynat). This ''structure overview'' is concentrated in the body of the report, and describes the important attributes of the technology. The second objective is to provide a framework that can be used to help in the classification and assessment of the different types of dynamic defense technologies along with some related capabilities and limitations. This information is primarily contained in the appendices.

  16. mail_paycheck_111609

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Updated:
11/16/09
 P.O Box 1663 Los Alamos, New Mexico 87544 MAIL PAYCHECK FORM TO: CRAFT PAYROLL DEPARTMENT - P238 FROM: (Please Print) Z# ORG CODE PLEASE MAIL MY PAYCHECK, TO THE ADDRESS ON FILE WITH PAYROLL, FOR THE PAY PERIOD BEGINNING: EMPLOYEE SIGNATURE Z# DATE SUPERVISOR SIGNATURE Z# DATE

  17. Address:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Additive Manufacturing: Pursuing the Promise Additive Manufacturing: Pursuing the Promise Fact sheet overviewing additive manufacturing techniques that are projected to exert a profound impact on manufacturing. Additive Manufacturing: Pursuing the Promise (1.42 MB) More Documents & Publications Unlocking the Potential of Additive Manufacturing in the Fuel Cells Industry Fiber Reinforced Polymer Composite Manufacturing Workshop A National Strategic Plan For Advanced Manufacturing

    Address:

  18. Mailing List Subscription

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mail and Distribution Mail and Distribution The DOE Mail Center provides a variety of mail services for all official and other authorized mail for the Department of Energy and its employees. The services provided include the processing of all incoming postal mail, outgoing official mail, internal mail processing, accountable mail processing, pouch mail, a variety of overnight express mail services, directory services, and pick-up and delivery services. The Mail Management Memorandum (pdf)

  19. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  20. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    For general information about NNSA, please feel free to contact us: Mailing Address National Nuclear Security Administration U.S. Department of Energy 1000 Independence Ave., S.W. ...

  1. Minutes from the January 10, 2013 Printing and Mail Teleconference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    January 10, 2013 Mail discussion Al Majors opened the meeting by discussing the Mail Management Report and latest update on status. One final report is yet to be submitted, after which close out will be accomplished. Copies will be provided to the Mail Managers once completed. Al introduced Derrick Miliner, Program Manager from the General Services Administration, Office of Government-wide Policy, and acknowledged Mr. Miliner's role in completing the Mail Management Report. Mail Security Plans A

  2. Native Village of Teller Addresses Heating Fuel Shortage, Improves Energy Security

    Broader source: Energy.gov [DOE]

    During a site visit to the Native Village of Teller in April 2012, the Office of Indian Energy's Strategic Technical Assistance Response Team helped the community successfully transfer 10,000 gallons of fuel to a bulk fuel facility to secure the community's heating supply for the winter.

  3. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    SciTech Connect (OSTI)

    James E. O'Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  4. Minutes from the May 3, 2012 Printing and Mail Teleconference

    Energy Savers [EERE]

    ... eliminate color, eliminate special finishes, eliminate blank pages) Reminder to send emails to me: Update for name, email address, and your roll (mail, printing or both) ...

  5. Mail Services User's Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-07-12

    This Manual provides detailed information on using the Department of Energy (DOE) mail services. Canceled by DOE G 573.1-1.

  6. Contact Us | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Us Contact Us Mail and delivery address information: Y-12 National Security Complex P.O. Box 2009 Oak Ridge, TN 37831-8245* Non-mail deliveries: Bear Creek Road P.O. Box 2009 Oak Ridge, TN 37830 *This mailstop is for general inquiries. For other mail, please contact the intended recipient for the appropriate mailstop. Verification of employment 865.574.4424 Employment Staffing 865.576.1377 Benefits One Call, 865.574.1500 Partnerships Tom Berg, 865.574.0907 Procurement

  7. Mail and Distribution | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mail and Distribution Mail and Distribution The DOE Mail Center provides a variety of mail services for all official and other authorized mail for the Department of Energy and its employees. The services provided include the processing of all incoming postal mail, outgoing official mail, internal mail processing, accountable mail processing, pouch mail, a variety of overnight express mail services, directory services, and pick-up and delivery services. The Mail Management Memorandum (pdf)

  8. By Certified Mail May

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    By Certified Mail May 4,2012 Dorothy Riehle FOIA Office U.S. Department of Energy P. O. Box 550 Richland, WA 99352 Re: FOIA RequestLand Transfer Dear Ms. Riehle: Pursuant to the...

  9. By E-Mail

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    By E-Mail May 29, 2012 Dorothy Riehle FOIA Office U.S. Department of Energy P. O. Box 550 Richland, WA 99352 Re: FOIA RequestTank Inventories Dear Ms. Riehle: Pursuant to the...

  10. Request Repository Mailing List

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Surveys NERSC Users Group Help Staff Blogs Request Repository Mailing List Need Help? Out-of-hours Status and Password help Call operations: 1-800-66-NERSC, option 1 or ...

  11. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  12. PDSF Mailing Lists

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mailing Lists PDSF Mailing Lists pdsf-status@nersc.gov This is voluntary. You have to subscribe to it. This list can be chatty, since major and minor problems are sent to this list. Also multiple status updates will be sent for extended outages. Subscribe: Send email to pdsf-status-request@nersc.gov with subscribe in the subject of the message. Unsubscribe: Send email to pdsf-status-request@nersc.gov with unsubscribe in the subject of the message. pdsf-users@nersc.gov Users are subscribed to

  13. Mail Services User's Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-10-03

    This Guide provides information on using Department of Energy (DOE) mail services in accordance with U.S. Postal Service, General Services Administration (GSA), and DOE regulations. Cancels DOE M 573.1-1. Canceled by DOE N 251.89.

  14. Printing and Mail Managers Exchange Forum Teleconference

    Broader source: Energy.gov (indexed) [DOE]

    Will include training modules for Agency Mail Managers, Facility Mail Managers, and Mail Clerk will be included. Link is transportationofficer.golearnportal.org. Password is ...

  15. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  16. Mailing List Subscription

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mailing List Subscription Jefferson Lab Home Search Contact JLab Descriptions A - C autocad: No description available briefs: On-Target Briefs cctest-alert: No description available clas_drift_chambers: Hall B Drift Chambers Group clas_offline: Discussion group for CLAS RECSIS group clas_slow_control: CLAS slow control working group clas_strangep: Hall B Strange Particles using CLAS discussion group clas_tof: CLAS Time of Flight Collaboration credit-card: List of JLab Credit Card buyers csc_all:

  17. Mailing Addresses and Information Numbers for Operations, Field...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bonneville Power Administration P.O. Box 3621 905 NE 11th Avenue Portland, OR 97232 ... of Energy Fermi Site Office P.O. Box 2000 Batavia, IL 60510 630-840-3281 U.S. ...

  18. Report Period: EIA ID NUMBER: Appendix A: Mailing Address: Appendix...

    U.S. Energy Information Administration (EIA) Indexed Site

    This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other ...

  19. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  20. LLNL E-Mail Utilities

    Energy Science and Technology Software Center (OSTI)

    2005-10-31

    The LLNL E-mail Utilities software library is a Java API that simplifies the creation and delivery of email in Java business applications. It consists of a database-driven template engine, various strategies for composing, queuing, dispatching email and a Java Swing GUI for creating and editing email templates.

  1. National Security Science | Los National Alamos Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    this Issue (pdf) In 2012 NSS received an NNSA Defense Programs AWARD OF EXCELLENCE National Security Science Mail Stop A142 Los Alamos National Laboratory Los Alamos, NM...

  2. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  3. Mail Management Memorandum, July 2, 2010 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mail Management Memorandum, July 2, 2010 Mail Management Memorandum, July 2, 2010 Mail Management Memorandum prescribing policy and requirements for the effective, economical, and ...

  4. Minutes from the Print and Mail Managers Exchange Forum Teleconference...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail...

  5. ASER Web Addresses and Points of Contact at DOE Sites

    Broader source: Energy.gov (indexed) [DOE]

    ASER Web Addresses and Points of Contact at DOE Sites March 29, 2013 Site and Web Address ASER Contact Name Phone E-mail Ames Laboratory http:www.ameslab.govoperationsesha...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  8. Keynote Address

    Broader source: Energy.gov [DOE]

    Wednesday's keynote address by Dr. David Danielson, Assistant Secretary for Energy Efficiency and Renewable Energy, U.S. Department of Energy.

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  10. Printing and Mail Managers Exchange Forum Teleconference

    Office of Environmental Management (EM)

    is online and available now. Reports are currently due December 6. Michael Radney is GSA POC for the SMART System (Michael.Radney@gsa.gov or 202 501-0937 Mail training for ...

  11. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL Security Review Process

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OFFICE OF INSPECTOR GENERAL Security Review Process S TEP ONE Complete and Return Security Acknowledgment Form You are responsible for returning the signed original Security Acknowledgement Form (DOE F 5631.18) located at http://www.energy.gov/ig/new-employees . The signed form should be returned to the Office of Inspector General's Headquarters Security Officer, via express mail, within 5 business days of receipt of your Tentative Appointment Letter. The form must be mailed to: Attn: Tiffany

  12. Legal and policy issues associated with monitoring employee E-mail

    SciTech Connect (OSTI)

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  13. Field Facilities Contacts for Printing and Mail | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Field Facilities Contacts for Printing and Mail Field Facilities Contacts for Printing and Mail This is the list of DOE field facilities contacts for Printing and Mail as of April 27, 2011. Go to Mail Services Go to Printing Services Field_Facilities_Contacts_Print-Mail.pdf (74.45 KB) More Documents & Publications Director's Perspective by George Miller Tenant Education and Training Fire Safety Committee Membership List

  14. Minutes from the Print and Mail Managers Exchange Forum Teleconferences |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences Minutes from the Print and Mail Managers Exchange Forum Teleconferences. Contact the Office of Administrative Management and Support at (202) 586-4318 with any questions. Last updated 01/30/14 Minutes from the November 21, 2013 Printing and Mail Teleconference (8.88 KB) Minutes from the September 19, 2013 Printing and Mail

  15. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  17. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  18. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  19. Via E-Mail Michael Li Electricity Policy Specialist U.S. Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 1, 2010 Via E-Mail Michael Li Electricity Policy Specialist U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 1000 Independence Avenue, SW Washington, DC 20585 smartgridpolicy@hq.doe.gov Re: Smart Grid RFI: Addressing Policy And Logistical Challenges Dear Mr. Li: On behalf of the Association of Home Appliance Manufacturers (AHAM), I would like to provide our comments on the Smart Grid RFI: Addressing Policy and Logistical Challenges, 75 Fed. Reg. 57,006

  20. Read Your E-mail | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Read Your E-mail All Argonne employees can read their e-mail through the web. Argonne E-Mail service is a robust, reliable electronic communication solution for supporting day-to-day business activities. Features include e-mail, calendar, task lists, and contact lists. While it is designed to work Microsoft Outlook, it also works with other POP- and IMAP-based clients. All employees can read their e-mail through the web. Use the login link at right to get started. Login to E-mail

  1. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  2. T-618: Debian update for exim4: Mail Transport Agent

    Broader source: Energy.gov [DOE]

    It was discovered that Exim, the default mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code.

  3. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  4. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Production Office Contact Us Contact Us NPO Public Affairs Manager Steven Wyatt (865) 576-9918 NPO Mailing Address NNSA Production Office PO Box 2050 Oak Ridge, TN 37831 Fax...

  5. Contact Us | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Contact Us If you have questions about activities at the Sandia Field Office, please contact the SFO Public Affairs Director at (505) 845-5264. Our mailing address is: U. S. ...

  6. Addressing the workforce pipeline challenge

    SciTech Connect (OSTI)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  7. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity ...

  8. Minutes from the January 19, 2011 Printing and Mail Teleconference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    January 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-one individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors Comments/Additions to last Months Minutes No comments. Printing Agenda Items......... Update on the Department-wide FY-2010 Three-Year Plan Dallas Woodruff, Headquarters in formed the group that the Department-wide Printing and Publishing Activities is currently in the concurrence

  9. Minutes from the July 21, 2010 Printing and Mail Teleconference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    July 21, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-one individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Update on the Government Printing Office revisions to the Standard Form one (SF!), Twenty-five

  10. Minutes from the June 28, 2012 Printing and Mail Teleconference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    June 28, 2012 Mail discussion Al Majors opened the meeting by introducing United Parcel Service (UPS) Representative Shelly Scott. Ms. Scott's contact information is: Shelly Scott shellyscott@ups.com 404 402-9827 (cell) Ms. Scott discussed issues relating to various UPS services available to the department. Next Al introduced Michael R. Sanders, President and Chief Executive Officer of Intra-Mail Network, an innovative, information Technology Company that improves the delivery of mail or email

  11. Minutes from the March 17, 2010 Printing and Mail Teleconference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 17, 2010 Printing and Mail Managers Exchange Forum Teleconference Twenty-eight individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Upcoming Congressional Joint Committee on Printing Commercial Printing Report "JCP Form

  12. Minutes from the May 26, 2010 Printing and Mail Teleconference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    26, 2010 Printing and Mail Managers Exchange Forum Teleconference Seventeen individuals participated in the Printing and Mail Managers Exchange Forum, which included Printing and Mail Managers and Contractors. Comments/Additions to last Months Minutes Dallas Woodruff, Headquarters opened the meeting by thanking everyone for participating in the today's teleconference. Printing Agenda Items... Update on the FY 2010, Congressional Joint Committee on Printing Commercial Printing Report "JCP

  13. Mail-Order Metal-Organic Frameworks (MOFs): Designing Isoreticular...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mail-Order Metal-Organic Frameworks (MOFs): Designing Isoreticular MOF-5 Analogues Comprising Commercially Available Organic Molecules Previous Next List R. L. Martin, L.-C. Lin,...

  14. VIA OVERNIGHT UPS MAIL CARRIER Dr. Charles F. McMillan, President

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8, 2016 VIA OVERNIGHT UPS MAIL CARRIER Dr. Charles F. McMillan, President Los Alamos National Security, LLC Los Alamos National Laboratory Mailstop A 100, Drop Point 03140071S Bikini Atoll Road, TA-3 Los Alamos, New Mexico 87545-1663 WEA-2016-02 Dear Dr. McMillan: This letter refers to the Department of Energy's (DOE) investigation into the facts and circumstances associated with the implementation of the Los Alamos National Laboratory (LANL) electrical safety program as evidenced by a series of

  15. 16th Department of Energy Computer Security Group Training Conference: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1994-04-01

    Various topic on computer security are presented. Integrity standards, smartcard systems, network firewalls, encryption systems, cryptography, computer security programs, multilevel security guards, electronic mail privacy, the central intelligence agency, internet security, and high-speed ATM networking are typical examples of discussed topics. Individual papers are indexed separately.

  16. Extremely High-Frequency Holographic Radar Imaging of Personnel and Mail

    SciTech Connect (OSTI)

    McMakin, Douglas L.; Sheen, David M.; Griffin, Jeffrey W.; Lechelt, Wayne M.

    2006-08-01

    The awareness of terrorists covertly transporting chemical warfare (CW) and biological warfare (BW) agents into government, military, and civilian facilities to harm the occupants has increased dramatically since the attacks of 9/11. Government and civilian security personnel have a need for innovative surveillance technology that can rapidly detect these lethal agents, even when they are hidden away in sealed containers and concealed either under clothing or in hand-carried items such as mailed packages or handbags. Sensor technology that detects BW and CW agents in mail or sealed containers carried under the clothing are under development. One promising sensor technology presently under development to defeat these threats is active millimeter-wave holographic radar imaging, which can readily image concealed items behind paper, cardboard, and clothing. Feasibility imaging studies at frequencies greater than 40 GHz have been conducted to determine whether simulated biological or chemical agents concealed in mail packages or under clothing could be detected using this extremely high-frequency imaging technique. The results of this imaging study will be presented in this paper.

  17. This form may be submitted to the EIA by mail, fax, e-mail, or...

    U.S. Energy Information Administration (EIA) Indexed Site

    over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this ...

  18. This form may be submitted to the EIA by mail, fax, e-mail, or...

    U.S. Energy Information Administration (EIA) Indexed Site

    over the web using secure, encrypted processes. (It is the same method that commercial companies use to communicate with customers when transacting business on the web.) To use ...

  19. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the individual to address concerns about his falsification of information and alcohol use. The individual's behavior raised security concerns under Criteria F, H and L....

  20. Army Energy Security Considerations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed

  1. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  2. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  3. Minutes from the November 17, 2010 Printing and Mail Teleconference

    Energy Savers [EERE]

    ... Majors have sent passwords to appropriate mail managers so they can access the on-line database for data entry. If you have not received your password, please contact Al Majors at ...

  4. This form may be submitted to the EIA by mail, fax, e-mail, or...

    U.S. Energy Information Administration (EIA) Indexed Site

    business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure...

  5. Microsoft Word - Contact List Template 11-5-14- ali notes.doc

    National Nuclear Security Administration (NNSA)

    SURFACE MAIL ADDRESSES The NMMSS classified mailing address is available on the Safeguards and Security Information Management System (SSIMS) or by calling a NMMSS analyst. ...

  6. Security for Radioactive Sources: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  7. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  8. Nonproliferation Policy | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation Policy Challenge: Address evolving threats/challenges to the nonproliferation and arms control regimes. Solution: Develop programs and strategies to address emerging nonproliferation and arms control challenges and opportunities. Learn More 10 CFR Part 810 Related Topics international security international security policy NIS nuclear controls safeguards safeguards and security verification Related News Nuclear Verification International Nuclear Safeguards Nonproliferation and

  9. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  10. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  11. E-mail et Web : pour une navigation sans risque

    ScienceCinema (OSTI)

    None

    2011-10-06

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l?utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  12. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Challenges | Department of Energy Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges. Southern recognizes that many policy and logistical concerns must be addressed for the promises of smart grid technologies and applications to be fully realized in ways that are beneficial, secure, and cost-effective

  13. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  14. Safeguards and Security for Program and Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-08-15

    This Guide addresses the implementation steps for achieving safeguards and security systems that support the Department's projection objectives.

  15. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  16. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  17. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  18. FAQS Reference Guide – Safeguards and Security

    Broader source: Energy.gov [DOE]

    This reference guide addresses the competency statements in the May 2009 edition of DOE-STD-1171-2009, Safeguards and Security Functional Area Qualification Standard.

  19. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  20. Data-Driven Mailing Helps Heat Up Untapped Seattle Market | Department...

    Energy Savers [EERE]

    Data-Driven Mailing Helps Heat Up Untapped Seattle Market Data-Driven Mailing Helps Heat Up Untapped Seattle Market Abridged transcript of an interview with Community Power Works ...

  1. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  2. Principal Associate Director - Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  3. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  4. Electronic Comment Form | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Electronic Comment Form Draft site-wide environmental impact statement for the continued operation of the DOE/NNSA Nevada National Security Site and off-site locations in the State of Nevada. DOE/NNSA will accept comments until December 2, 2011 Name * E-mail (optional) Organization Comment * Leave this field blank Submit

  5. Environmental Security and Restoration | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Security & Restoration Argonne's work in environmental security and restoration addresses soil, surface water, sediment, and groundwater at contaminated sites. Argonne's work in environmental restoration addresses soil, surface water, sediment, and groundwater at contaminated sites, starting with environmental evaluations and planning projects. Assessments are also conducted of approaches for long-term stewardship of remediated sites with residual contamination. Remedies range

  6. Brinkman Addresses JLab | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brinkman Addresses JLab Brinkman Addresses JLab Brinkman Addresses JLab Dr. William F. Brinkman, Director of the Department of Energy's Office of Science, addressed Jefferson Lab staff on the Office of Science perspective during his visit Monday. Dr. William F. Brinkman, Director of the Department of Energy's Office of Science, addressed Jefferson Lab staff on the Office of Science perspective during his visit Monday. "There is still a lot of interesting nuclear physics that we want to do

  7. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  8. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  9. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  11. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  13. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  14. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  15. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  16. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  17. Keynote Address | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Keynote Address Keynote Address An overview and update on Environmental Management given by Alice Williams, Associate Principal Deputy Assistant Secretary of the Office of Environmental Management. Keynote Address (2.53 MB) More Documents & Publications EIS-0337-SA-01: Supplement Analysis West Valley Demonstration Project Low-Level Waste Shipment Chairs Meeting - October 2012

  18. U.S. DEPARTMENT OF ENERGY RECEIPT FOR CONTROLLED MAIL PARCEL SERVICE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HQ F 1410.2 (06-93) U.S. DEPARTMENT OF ENERGY RECEIPT FOR CONTROLLED MAIL PARCEL SERVICE (Receipt No.) MAIL STATION: DATE: TO: NAME: ROUTING SYMBOL: FROM: DOE Mail Facility, Office of Administration Services 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. ITEM NO. ITEM NO. ITEM NO. SIGN AND RETURN WITHIN 24 HOURS TO AVOID TRACER ACTION TO DOE MAIL FACILITY (Stamp Location) RECEIVED BY: DATE: Printed with soy ink on recycled paper

  19. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  20. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  1. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  2. Implementation of a parallel multilevel secure process. Master's thesis

    SciTech Connect (OSTI)

    Pratt, D.R.

    1988-06-01

    This thesis demonstrates an implementation of a parallel multilevel secure process. This is done within the framework of an electronic-mail system. Security is implemented by GEMSOS, the operating system of the Gemini Trusted Computer Base. A brief history of computer secrecy is followed by a discussion of security kernels. Event counts and sequences are used to provide concurrency control and are covered in detail. The specifications for the system are based upon the requirements for a Headquarters of a hypothetical Marine Battalion in garrison.

  3. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  4. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect (OSTI)

    Sweeney, D. J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  6. New partnership uses advanced computer science modeling to address climate

    National Nuclear Security Administration (NNSA)

    change | National Nuclear Security Administration | (NNSA) partnership uses advanced computer science modeling to address climate change Friday, August 29, 2014 - 10:26am Several national laboratories and institutions have joined forces to develop and apply the most complete climate and Earth system model to address the most challenging and demanding climate change issues. Accelerated Climate Modeling for Energy, or ACME, is designed to accelerate the development and application of fully

  7. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  13. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  15. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  16. T-644: Prenotification Security Advisory- Adobe Acrobat & Adobe Readers Updates

    Broader source: Energy.gov [DOE]

    A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products.

  17. Securing WLANs using 802.11i | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    WLANs using 802.11i Securing WLANs using 802.11i This paper addresses design principles and best practices regarding the secure implementation and operation of Wireless LAN (WLAN) ...

  18. 2015 Safeguards and Security Directors Conference- July 14- 16, 2015

    Broader source: Energy.gov [DOE]

    This event will address many of the significant policy updates, reorganization, and topics of departmental emphasis that have occurred in recent years while also focusing on the myriad of other contemporary security topics and programs that impact our security operations.

  19. Keynote Address | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    40PM to 2:05PM PDT Pacific Ballroom Wednesday keynote address by Dan Arvizu, Director, National Renewable Energy Laboratory

  20. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  2. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  3. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema (OSTI)

    Eric Isaccs

    2010-01-08

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  4. {open_quotes}Media-On-Demand{close_quotes} multimedia electronic mail: A tool for collaboration on the web

    SciTech Connect (OSTI)

    Tsoi, Kei Nam; Rahman, S.M.

    1996-12-31

    Undoubtedly, multimedia electronic mail has many advantages in exchanging information electronically in a collaborative work. The existing design of e-mail systems architecture is inefficient in exchanging multimedia message which has much larger volume, and requires more bandwidth and storage space than the text-only messages. This paper presents an innovative method for exchanging multimedia mail messages in a heterogeneous environment to support collaborative work over YAW on the Internet. We propose a {open_quotes}Parcel Collection{close_quotes} approach for exchanging multimedia electronic mail messages. This approach for exchanging multimedia electronic mail messages integrates the current WWW technologies with the existing electronic mail systems.

  5. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect (OSTI)

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  6. FAQS Reference Guide – Safeguards and Security General Technical Base

    Office of Energy Efficiency and Renewable Energy (EERE)

    This reference guide addresses the competency statements in the July 2009 edition of DOE-STD-1123-2009, Safeguards and Security General Technical Base Qualification Standard.

  7. Recommended Practices Guide For Securing ZigBee Wireless Networks...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments This paper addresses design principles and best practices regarding the ...

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Introduction SCADA Security for Managers and Operators | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Introduction SCADA Security for Managers and Operators Introduction SCADA Security for Managers and Operators SCADA Test Bed introduction to managers and operators in the field- To establish a National capability to support industry and government in addressing control system cyber security and vulnerabilities in the energy sector Introduction SCADA Security for Managers and Operators (8.15 MB) More Documents & Publications Intermediate SCADA Security Training Course Slides

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. ldrd | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ldrd Laboratory Directed Research & Development The U.S. Department of Energy (DOE) is charged with a large and complex mission: to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The DOE executes this mission to a large extent at

  14. detonation detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    detonation detection NNSA administrator visits NNSS to meet team, see national security work Last month, Department of Energy Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) visited NNSA's Nevada Field Office where he hosted an all-hands for NNSA-Nevada staff and presented several service awards. During the trip he visited the NNSA... Radiological Security The program collaborates with domestic and international partners to address the threat of illicit

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  16. U.S. Postal Service General Mail Facility, San Diego, California |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Postal Service General Mail Facility, San Diego, California U.S. Postal Service General Mail Facility, San Diego, California Overview The U.S. Postal Service (USPS) was the first Federal agency to award a shared energy savings (SES) contract (now known as energy savings performance contracts). The contract was awarded to the Co-Energy Group in December 1987 for a lighting retrofit at the USPS General Mail Facility in San Diego, California. The local utility, San Diego

  17. U.S. Postal Service General Mail Facility, San Diego, California |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy U.S. Postal Service General Mail Facility, San Diego, California U.S. Postal Service General Mail Facility, San Diego, California Overview The U.S. Postal Service (USPS) was the first Federal agency to award a shared energy savings (SES) contract (now known as energy savings performance contracts). The contract was awarded to the Co-Energy Group in December 1987 for a lighting retrofit at the USPS General Mail Facility in San Diego, California. The local utility, San

  18. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  19. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  20. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  1. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  2. Sign Up for E-mail Updates | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    MSE Home About Staff What's New Research Areas Reports and Activities Science Highlights Principal Investigators' Meetings BES Home What's New Sign Up for E-mail Updates Print Text ...

  3. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  7. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  8. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  9. Addressing the Need for Independence in the CSE Model

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T; Grimaila, Michael R

    2011-01-01

    Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.

  10. Data-Driven Mailing Helps Heat Up Untapped Seattle Market | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Data-Driven Mailing Helps Heat Up Untapped Seattle Market Data-Driven Mailing Helps Heat Up Untapped Seattle Market Abridged transcript of an interview with Community Power Works Project Manager Ruth Bell and Program/System Analyst Vince Schueler of the Washington State University Energy Program. Seattle Focus Series (293.13 KB) More Documents & Publications The Better Buildings Neighborhood View -- January 2013

  11. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  12. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  13. State of the Lab Address

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  15. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  16. Addressing Deferred Maintenance, Infrastructure Costs, and Excess...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities at Portsmouth and Paducah Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities ...

  17. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities A Public Meeting ...

  18. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Alliance to Save Energy. | Department of Energy Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save Energy is a coalition of prominent business, government, environmental, and consumer leaders who promote the efficient use of energy worldwide to benefit consumers, the environment, economy, and national security. The Alliance to Save Energy (the Alliance) thanks the

  19. ADP computer security classification program

    SciTech Connect (OSTI)

    Augustson, S.J.

    1984-01-01

    CG-ADP-1, the Automatic Data Processing Security Classification Guide, provides for classification guidance (for security information) concerning the protection of Department of Energy (DOE) and DOE contractor Automatic Data Processing (ADP) systems which handle classified information. Within the DOE, ADP facilities that process classified information provide potentially lucrative targets for compromise. In conjunction with the security measures required by DOE regulations, necessary precautions must be taken to protect details of those ADP security measures which could aid in their own subversion. Accordingly, the basic principle underlying ADP security classification policy is to protect information which could be of significant assistance in gaining unauthorized access to classified information being processed at an ADP facility. Given this policy, classification topics and guidelines are approved for implementation. The basic program guide, CG-ADP-1 is broad in scope and based upon it, more detailed local guides are sometimes developed and approved for specific sites. Classification topics are provided for system features, system and security management, and passwords. Site-specific topics can be addressed in local guides if needed.

  20. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  1. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  2. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  3. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect (OSTI)

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  4. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  5. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  6. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    » Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes

  7. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  8. Keynote address: International nuclear cooperation

    SciTech Connect (OSTI)

    Kennedy, R.T.

    1989-01-01

    These meetings provide an important opportunity for the nuclear community to assess the scope and direction of its wide-ranging activities. Nuclear technology has given us the tools to understand and shape our physical environment in ways which can solve ancient problems of health, food supply, energy, and many others which affect the quality of our lives. International cooperation is necessary to secure the peaceful benefits of nuclear technology. Meeting global energy needs must be high on any priority list of issues for the coming decade and the 21st century. The satisfaction of energy needs is today and will increasingly be a crucial factor in international stability. Hand in hand with the need to assure energy sufficiency is the need to assure the long-term protection of the environment. Three key elements that give a useful framework for approaching the future of nuclear cooperation are technological factors, economic issues, and political acceptability. Technological avenues to greater safety must be vigorously pursued. Economic alternatives must be identified and objectively weighed. Most important of all, the framework of public confidence must be strengthened.

  9. PCS Security Technology Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2007-01-30

    P-STET assists in the security technology decision making process from a costlbeneflt perspective. It aids in addressing such questions as whether to acquire and deploy new security technology, to re-configure an existing product or system, or to maintain status quo. P-STET offers both a qualitative and quantitative option. P-STET is most efficient when tailored to an organization’s security cost/benefit environment. It then serves as both a guide to show what types of security questions shouldmore » be addressed and as a means to analyze the data gathered from the questions to make an informed decision. The quantitative option provides a straightforward way to express costs/benefits in terms of dollars. It relies on the organization to quantify benefits or cost avoidances, and, therefore, best serves as a guide to ensure various cost and benefit angles are evaluated. The qualitative option allows the organization to assess costs by levels with respect to security and PCS budgets, operational impacts, and opportunity costs. Benefits are represented in terms of improvements to the organization’s operations and are also assessed by levels with respect to some benchmark such as compliance with best practices. Results are displayed graphically using radar charts, allowing the user to make a more intuitive decision. The shaded area of each chart represents the overall cost and benefit of the security investment. A good investment is denoted when the ratio of benefit shaded area to cost shaded area is large.« less

  10. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. Addressing Failures in Exascale Computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert; Abraham, Jacob; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, J.; Bose, Pradip; Cappello, Franck; Carlson, Bill; Chien, Andrew; Coteus, Paul; DeBardeleben, Nathan; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Fazzari, Saverio; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Rob; Stearley, Jon; Van Hensbergen, Eric

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  12. Addressing failures in exascale computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  13. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  14. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  15. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  16. Major prime contractors have developed a plan to address Hanford Beryllium exposure and are continuing to improve the Chronic Beryllium Disease Prevention Plan (CBDPP)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OMC-CS-532H Rev. 2 Published 05/05/16 Beryllium Information Booklet Beryllium Information Provided By: HPMC Occupational Medical Services http://www.hanford.gov/health/ Physical Address: MSIN G3-70 1979 Snyder Street, Suite 150 Richland, WA 99354 Mailing Address: P.O. Box 150 Richland, WA 99352 HPMC Occupational Medical Services - Beryllium Information Booklet OMC-CS-532H Rev. 2 Published 05/05/16 1 Table of Contents Disclaimer

  17. JLab Test Public Address System | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Public Address System May 18 at 5:30 p.m.: JLab Will Test its Public Address System On Wednesday, May 18, Jefferson Lab will conduct the monthly test of its Public Address ...

  18. U.S. Energy Secretary Addresses International Atomic Energy Agency General

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference | Department of Energy Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 4:48pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in the nuclear

  19. U.S. Energy Secretary Addresses International Atomic Energy Agency General

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conference | Department of Energy Energy Secretary Addresses International Atomic Energy Agency General Conference U.S. Energy Secretary Addresses International Atomic Energy Agency General Conference September 19, 2011 - 2:24pm Addthis VIENNA, AUSTRIA - U.S. Energy Secretary Steven Chu addressed the International Atomic Energy Agency's General Conference today in Vienna. Opening with a message from President Barack Obama, Secretary Chu highlighted the importance of safety and security in

  20. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nations critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  1. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  2. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  3. Keynote Address: Update on Environmental Management | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address: Update on Environmental Management Keynote Address: Update on Environmental Management Keynote presentation made by David G. Huizenga for the NTSF annual meeting held from ...

  4. EPA -- Addressing Children's Health through Reviews Conducted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EPA -- Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act EPA -- Addressing Children's ...

  5. Symbiosis: Addressing Biomass Production Challenges and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening ...

  6. Deputy Secretary Poneman Addresses Nuclear Deterrence Summit...

    Office of Environmental Management (EM)

    Addresses Nuclear Deterrence Summit Deputy Secretary Poneman Addresses Nuclear Deterrence Summit February 17, 2010 - 12:00am Addthis Alexandria, VA - U.S. Deputy Secretary of ...

  7. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  10. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  11. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  12. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  14. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  15. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  16. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  18. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  19. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  20. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  1. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  2. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  3. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  4. Content-addressable memory based enforcement of configurable policies

    SciTech Connect (OSTI)

    Berg, Michael J

    2014-05-06

    A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.

  5. Address conversion unit for multiprocessor system

    SciTech Connect (OSTI)

    Fava, T.F.; Lary, R.F.; Blackledge, R.

    1987-03-03

    An address conversion unit is described for use in one processor in a multi-processor data processing system including a common memory, the processors and common memory being interconnected by a common bus including means for transferring address signals defining a common address space. The processor includes private bus means including means for transferring signals including address signals defining a private address space. A processor unit means is connected to the private bus means and includes means for transmitting and receiving signals including address signals over the private bus means for engaging in data transfers thereover. The address conversion unit is connected to the private bus means and common bus means for receiving address signals over the private bus means from the processor unit means in the private address space. The unit comprises: A. pointer storage means for storing a pointer identifying a portion of the common bus memory space; B. pointer generation means connected to receive a common bus address and for generating a pointer in response thereto for storage in the pointer storage means; and C. common bus address generation means connected to the private bus and the pointer storage means for receiving an address from the processor unit means and for generating a common bus address in response thereto. The common bus address is used to initiate transfers between the processor unit means and the common memory over the common bus.

  6. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore »and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  7. Beyond a series of security nets: Applying STAMP & STPA to port security

    SciTech Connect (OSTI)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.

  8. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  9. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  10. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  11. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  12. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  13. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  14. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  15. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  16. Jackie Chen to give keynote address at ISC High performance conference in

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Germany to give keynote address at ISC High performance conference in Germany - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing

  17. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  18. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  19. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  20. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  1. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  2. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  3. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  4. Y-12 Times archive | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employees & Retirees / Y-12 Times archive Y-12 Times archive Posted: July 19, 2012 - 12:12pm The Y-12 Times was a newsletter for employees and friends of the Y-12 National Security Complex. Past issues are available as PDF files. The newsletter primarily served Y-12 employees and their families, but was also mailed to other U.S. Department of Energy sites around the world. Federal and state congressional delegates from Tennessee also received the newsletter, as well as local news media. 2014

  5. Preliminary Notice of Violation issued to Lawrence Livermore National Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    September 25, 20 14 CERTIFI ED MAIL RETURN RECEIPT REQUESTED Dr. William H. Goldstein Laboratory Director Lawrence Livermore National Security, LLC Lawrence Livermore National Laboratory 7000 East A venue Livermore, California 94550 WEA-2014-03 Dear Dr. Goldstein: ///A I. '!f ~ ~l 11/ IVA.~~~ N*tlon*I NucWr S.cutlty Administration This letter refers to the Depa11ment of Energy's (DOE) investigation into the facts and circumstances related to the sulfuri c acid burn event at Lawrence Livermore

  6. POLICY GUIDANCE MEMORANDUM #03 Addressing Missclassified Positions

    Broader source: Energy.gov [DOE]

    This memorandum provides policy guidance on how to consistently address misclassified positions within the Department and is effective immediately. There are several different circumstances that affect how a misclassified position will be addressed.

  7. PSH-15-0101 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 1 - In the Matter of Personnel Security Hearing PSH-15-0101 - In the Matter of Personnel Security Hearing On April 19, 2016, an OHA Administrative Judge issued a decision in which he concluded that an individual's security clearance should not be restored. The local security office (LSO) had conducted personnel security interviews with the individual in both 1991 and 1999 to address financial matters. In 2014, the individual disclosed on a QNSP both collection debt and delinquent

  8. PSH-16-0005 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 5 - In the Matter of Personnel Security Hearing PSH-16-0005 - In the Matter of Personnel Security Hearing On March 29, 2016, an Administrative Judge issued a decision in which she concluded that an individual's security clearance should not be restored. In July 2015, a Local Security Office (LSO) conducted a personnel security interview (PSI) of the individual to address concerns regarding his arrest and charge for Aggravated Assault Against a Household Member with a Deadly Weapon, a

  9. Statement from National Security Council Spokesman Tommy Vietor...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    delegation to So Paulo and to Rio de Janeiro to meet with public and private enterprise. ... address our mutual interest in the development of safe, secure and affordable energy ...

  10. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  11. Denial technology, the neglected security element

    SciTech Connect (OSTI)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection.

  12. Overview of Accelerator Applications for Security and Defense

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  13. Overview of Accelerator Applications for Security and Defense

    SciTech Connect (OSTI)

    Antolak, Arlyn J.

    2015-01-01

    Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.

  14. V-130: Microsoft Security Bulletin Advance Notification for April 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for April 2013. Microsoft has posted 2 Critical Bulletins and 7 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).

  15. V-108: Microsoft Security Bulletin Advance Notification for March 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for March 2013. Microsoft has posted 4 Critical Bulletins and 3 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on March 13, 2013, at 11:00 AM Pacific Time (US & Canada).

  16. V-154: Microsoft Security Bulletin Advance Notification for May 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for May 2013. Microsoft has posted 2 Critical Bulletins and 8 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on May 15, 2013, at 11:00 AM Pacific Time (US & Canada).

  17. V-175: Microsoft Security Bulletin Advance Notification for June 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for June 2013. Microsoft has posted 1 Critical Bulletin and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" June allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on June 12, 2013, at 11:00 AM Pacific Time (US & Canada).

  18. V-196: Microsoft Security Bulletin Advance Notification for July 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada).

  19. V-088: Microsoft Security Bulletin Advance Notification for February 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for February 2013. Microsoft has posted 5 Critical Bulletins and 7 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on February 13, 2013, at 11:00 AM Pacific Time (US & Canada).

  20. U-057: Microsoft Security Bulletin Advance Notification for December 2011

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

  1. V-023: Microsoft Security Bulletin Advance Notification for November 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code.Microsoft will host a webcast to address customer questions on the security bulletins on November 14, 2012, at 11:00 AM Pacific Time (US & Canada).

  2. V-064: Microsoft Security Bulletin Advance Notification for January 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for January 2013 . Microsoft has posted 2 Critical Bulletins and 5 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on January 9, 2013, at 11:00 AM Pacific Time (US & Canada).

  3. V-042: Microsoft Security Bulletin Advance Notification for December 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for December 2012. Microsoft has posted 5 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on December 12, 2012, at 11:00 AM Pacific Time (US & Canada).

  4. VIA OVERNIGHT MAIL CARRIER Mr. John D. Woolery President and Project Manager

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    13, 2016 VIA OVERNIGHT MAIL CARRIER Mr. John D. Woolery President and Project Manager Portsmouth and Paducah DUF 6 Project BWXT Conversion Services, LLC 1020 Monarch Street Suite 300 Lexington, Kentucky 40513 WEA-2016-03 Dear Mr. Woolery: This letter refers to the Department of Energy's (DOE) investigation into the facts and circumstances associated with the March 25, 2015, potassium hydroxide (KOH) injury event at the Portsmouth DUF 6 Conversion Plant. The DOE Office of Enterprise Assessments'

  5. By E-Mail Daniel Cohen Assistant General Counsel for Legislation, Regulation, and Energy Efficiency

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    August 1, 2011 By E-Mail Daniel Cohen Assistant General Counsel for Legislation, Regulation, and Energy Efficiency U.S. Department of Energy Office of the General Counsel 1000 Independence Ave., SW Room 6A245 Washington, D.C. 20585 Regulatory.Review@hq.doe.gov Re: EO 13563 Preliminary Plan Dear Mr. Cohen: The Association of Home Appliance Manufacturers (AHAM) respectfully submits the following comments to the Department of Energy (DOE) on preliminary plan for retrospective analysis of existing

  6. By E-Mail Daniel Cohen Assistant General Counsel for Legislation, Regulation, and Energy Efficiency

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    June 19, 2012 By E-Mail Daniel Cohen Assistant General Counsel for Legislation, Regulation, and Energy Efficiency U.S. Department of Energy Office of the General Counsel 1000 Independence Ave., SW Washington, D.C. 20585 Regulatory.Review@hq.doe.gov Re: Regulatory Burden RFI Dear Mr. Cohen: The Association of Home Appliance Manufacturers (AHAM) respectfully submits the following comments to the Department of Energy (DOE) on its Regulatory Burden RFI, 77 Fed. Reg. 28518 (May 15, 2012). AHAM

  7. By E-Mail Daniel Cohen Assistant General Counsel for Legislation, Regulation, and Energy Efficiency

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21, 2011 By E-Mail Daniel Cohen Assistant General Counsel for Legislation, Regulation, and Energy Efficiency U.S. Department of Energy Office of the General Counsel 1000 Independence Ave., SW Room 6A245 Washington, D.C. 20585 Regulatory.Review@hq.doe.gov Re: Regulatory Burden RFI Dear Mr. Cohen: The Association of Home Appliance Manufacturers (AHAM) respectfully submits the following comments to the Department of Energy (DOE) on its Request for Information on reducing regulatory burden, 76 Fed.

  8. CERTIFIED MAIL RETURN RECEIPT REQUESTED Dr. Chi-Chang Kao Laboratory Director

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    , 2014 CERTIFIED MAIL RETURN RECEIPT REQUESTED Dr. Chi-Chang Kao Laboratory Director SLAC National Accelerator Laboratory Stanford University 2575 Sand Hill Road Menlo Park, California 94025-7015 WEA-2014-05 Dear Dr. Kao: This letter refers to the Department of Energy's (DOE) investigation into the facts and circumstances associated with the implementation of worker safety and health program requirements related to laser and electron beam equipment at SLAC National Accelerator Laboratory (SLAC)

  9. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  10. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  11. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  12. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect (OSTI)

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  13. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  14. Realizing Scientific Methods for Cyber Security

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  15. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  16. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  17. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  18. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  19. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  20. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  1. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  2. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  3. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  4. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  5. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  6. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  7. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  8. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  9. Research Projects Addressing Technical Challenges to Environmentally

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Acceptable Shale Gas Development Selected by DOE | Department of Energy Addressing Technical Challenges to Environmentally Acceptable Shale Gas Development Selected by DOE Research Projects Addressing Technical Challenges to Environmentally Acceptable Shale Gas Development Selected by DOE November 28, 2012 - 12:00pm Addthis Washington, DC - Fifteen research projects aimed at addressing the technical challenges of producing natural gas from shales and tight sands, while simultaneously

  10. Keynote Address: Future Vision | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    0, 2014 1:00PM to 1:30PM PDT Pacific Ballroom Tuesday's keynote address by Raffi Garabedian, Chief Technology Officer, First Solar

  11. Addressing Challenges of Identifying Geometrically Diverse Sets...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Addressing Challenges of Identifying Geometrically Diverse Sets of Crystalline Porous Materials Previous Next List R. L. Martin, B. Smit, and M. Haranczyk, J. Chem Inf. Model. 52...

  12. Recommendations to Address Power Reliability Concerns Raised...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns Raised as a ...

  13. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  14. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  15. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Microgrid cyber security reference architecture.

    SciTech Connect (OSTI)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  17. Toward more testable security equipment

    SciTech Connect (OSTI)

    Spencer, D.D.; Murray, D.W. )

    1991-01-01

    An important functional aspect of most security related equipment is the need for periodic performance testing. Sensors, entry-control devices, and other such security equipment usually have some sort or reliability or testing requirements. Unfortunately, testing requirements are seldom considered during equipment design, and testing becomes a prohibitively expensive or inconvenient afterthought. In this paper work at Sandia National Laboratories to address this concern is presented, focusing on metal detectors as a test case. Field testing of metal detectors is usually done by passing a test object through the opening to see whether an alarm is generated or not. Such alarm/no-alarm data are poor for making reliability estimates, and thus, a large quantity of such data is required to make good reliability statements. The detector itself uses much better internal information. Experiments tapping into some of this internal data will be discussed, and conclusions will be drawn about the possibility of redesign of metal detectors for enhanced testability. Such conclusions have implications for other types of security-related devices, as well.

  18. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  19. Cyber in the Cloud -- Lessons Learned from INL's Cloud E-Mail Acquisition

    SciTech Connect (OSTI)

    Troy Hiltbrand; Daniel Jones

    2012-12-01

    As we look at the cyber security ecosystem, are we planning to fight the battle as we did yesterday, with firewalls and intrusion detection systems (IDS), or are we sensing a change in how security is evolving and planning accordingly? With the technology enablement and possible financial benefits of cloud computing, the traditional tools for establishing and maintaining our cyber security ecosystems are being dramatically altered.

  20. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  1. Next Generation National Security Leaders

    SciTech Connect (OSTI)

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

  2. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. 2575 Sand Hill Road * Mail Stop 103 * Menlo Park, CA 94025-7015

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    575 Sand Hill Road * Mail Stop 103 * Menlo Park, CA 94025-7015 650-926-2288 * Fax 650-926-4695 SLAC is operated by Stanford University for the U.S. Department of Energy SLAC National Accelerator Laboratory LCLS Users' Newsletter, Issue 1, April 8, 2009 Dear Colleagues: We would like to present to you the first issue of the LCLS Users' Newsletter. We are pleased to report that we have recruited Henia Kamil as the LCLS User Research Administrator Manager. Please join me in welcoming Henia and feel

  4. Analysis of Vehicle-Based Security Operations

    SciTech Connect (OSTI)

    Carter, Jason M; Paul, Nate R

    2015-01-01

    Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications must be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be

  5. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  6. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  7. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  8. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  9. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  10. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  11. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  14. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  15. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  16. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  17. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  19. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  20. Provision of mobile and man-portable radiation detection equipment;
  21. Regional cooperation on safeguards...

  22. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  1. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  2. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  4. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  5. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  6. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  7. EZ reader: Embedded AI for automatic electronic mail interpretation and routing

    SciTech Connect (OSTI)

    Rice, A.; Hus, J.; Angotti, A.; Piccolo, R.

    1996-12-31

    EZ Reader is an intelligent electronic mail (email) reader that employs a unique combination of rule-based parsing and case-based reasoning to automatically and with a high level of accuracy classify and respond to large volumes of incoming email. EZ Reader reduces the time and human resources required to handle incoming email by selecting responses and adding attachments and advice to each incoming message based on how previous similar messages were handled. The application, developed for Chase Manhattan Bank using Brightware, Inc.`s ART* Enterprise{reg_sign} tool, answers emails automatically and decreases processing time for those requiring manual review. Phase I of EZ Reader was deployed in the first quarter of 1996, and handles up to 80% of incoming mail automatically, depending on message content. Later phases will enable automatic processing of a wider variety of messages. By dramatically reducing the effort associated with manual processing, EZ Reader will pay its own development costs within six months and will result in substantial, recurring dollar savings each year. This paper describes EZ Reader in detail, including its Al-based design, testing, implementation and development history.

  8. A secure communications infrastructure for high-performance distributed computing

    SciTech Connect (OSTI)

    Foster, I.; Koenig, G.; Tuecke, S.

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  9. 2015 State of Indian Nations Address

    Broader source: Energy.gov [DOE]

    The President of the National Congress of American Indians will deliver his annual State of the Indian Nations address to Member of Congress, government officials, tribal leaders and citizens, and...

  10. Weekly Address: Time to Create the Energy Security Trust | Department of

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy Webinar Slides about the new Bioenergy KDF october2013_kdf_webinar.pdf (1.13 MB) More Documents & Publications Office of the Biomass Program Educational Opportunities in Bioenergy Intro Webinar Bioenergy Technologies Office Overview Biomass 2013: Welcome Department of Energy

    webinar recording for the Fuel Cell Technologies Office webinar, "What Can We Learn from Hydrogen Safety Event Databases?" originally held on September 10, 2013. In addition to

  11. Rio Arriba Leadership Summit addresses challenges, opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    » Rio Arriba Leadership Summit addresses challenges, opportunities Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: September 1, 2016 all issues All Issues » submit Rio Arriba Leadership Summit addresses challenges, opportunities Community leaders gather in Española for a round-table discussion. July 6, 2016 DOE's Office of Small and Disadvantaged Business Utilization presented Mentor and Protégé of the Year awards to LANS and RG

  12. Emerging threats to global security focus of March 12 talk at Bradbury

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Museum Emerging threats to global security talk March 12 Emerging threats to global security focus of March 12 talk at Bradbury Science Museum Terry Wallace will focus on how the Lab will address these issues and help the government respond. March 6, 2014 Terry Wallace, principal associate director for Global Security Terry Wallace, principal associate director for Global Security Contact Steve Sandoval Communications Office (505) 665-9206 Email During the next 20 years, as the

  13. Acting NNSA Administrator Bruce Held visits Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | Y-12 National Security Complex Acting NNSA Administrator ... Acting NNSA Administrator Bruce Held visits Y-12 National Security Complex Posted: July 25, 2013 - 6:05pm Acting NNSA Administrator Bruce Held visits Y-12 Bruce Held, Acting NNSA Administrator and Acting Undersecretary for Nuclear Security, visited the Y-12 National Security Complex today. Held toured the site and conducted an All Hands meeting at the site's New Hope Center addressing federal and contractor employees. Held (shown

  14. PSH-15-0020 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 0 - In the Matter of Personnel Security Hearing PSH-15-0020 - In the Matter of Personnel Security Hearing On June 17, 2015, an OHA Administrative Judge issued a decision in which she concluded that an individual's access authorization should not be restored. A Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns under Criterion L regarding her financial irresponsibility. After conducting a hearing and evaluating the evidence,

  15. PSH-16-0004 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 4 - In the Matter of Personnel Security Hearing PSH-16-0004 - In the Matter of Personnel Security Hearing On April 14, 2016, an OHA Administrative Judge issued a decision in which she concluded that an individual's access authorization should not be restored. A Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns under Criterion L regarding his delinquent debts and deliberate misrepresentations on his QNSP. After conducting a

  16. PSH-16-0008 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 8 - In the Matter of Personnel Security Hearing PSH-16-0008 - In the Matter of Personnel Security Hearing On May 19, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. In August 2015, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol-related arrests and alcohol use. In addition

  17. PSH-16-0012 - In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 2 - In the Matter of Personnel Security Hearing PSH-16-0012 - In the Matter of Personnel Security Hearing On June 20, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should be granted. In October 2015, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his gambling. In addition to the PSI, the LSO requested the

  18. PSH-16-0032 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 2 - In the Matter of Personnel Security Hearing PSH-16-0032 - In the Matter of Personnel Security Hearing On August 9, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. In October 2015, as part of a background investigation, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his falsifications and alcohol use. In addition to

  19. PSH-12-0055- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. On October 11, 2011, the individual filed for personal bankruptcy under Chapter 7 of the federal bankruptcy laws. Upon being apprised of this, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in order to address the security concerns raised by this filing.

  20. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  4. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  5. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  7. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  8. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  9. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  10. ICF Reports | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Fusion ICF Reports There are a wide variety of reports that address the world class research and experiments in ICF being performed on behalf of the U.S. ICF Program and stockpile stewardship. Some of these reports are listed below: 2016 Inertial Confinement Fusion Program Framework, U.S. Department of Energy, National Nuclear Security Administration, May 16, 2016. DOE/NA-0044 2015 Review of the Inertial Confinement Fusion and High Energy Density Science Portfolio, U.S. Department of Energy,

  11. Stockpile | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fiscal Year 2015 Stockpile Stewardship and Management Plan Report to Congress April 2014 United States Department of Energy Washington, DC 20585 Department of Energy | April 2014 Fiscal Year 2015 Stockpile Stewardship and Management Plan | Page i Message from the Secretary This report is the Department of Energy National Nuclear Security Administration Fiscal Year 2015 Stockpile Stewardship and Management Plan. It addresses the statutory requirements of Title 50 of United States Code section

  12. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  13. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  14. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  15. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  16. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  17. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  18. Cheaper Adjoints by Reversing Address Computations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hascoët, L.; Utke, J.; Naumann, U.

    2008-01-01

    The reverse mode of automatic differentiation is widely used in science and engineering. A severe bottleneck for the performance of the reverse mode, however, is the necessity to recover certain intermediate values of the program in reverse order. Among these values are computed addresses, which traditionally are recovered through forward recomputation and storage in memory. We propose an alternative approach for recovery that uses inverse computation based on dependency information. Address storage constitutes a significant portion of the overall storage requirements. An example illustrates substantial gains that the proposed approach yields, and we show use cases in practical applications.

  19. Shared address collectives using counter mechanisms

    DOE Patents [OSTI]

    Blocksome, Michael; Dozsa, Gabor; Gooding, Thomas M; Heidelberger, Philip; Kumar, Sameer; Mamidala, Amith R; Miller, Douglas

    2014-02-18

    A shared address space on a compute node stores data received from a network and data to transmit to the network. The shared address space includes an application buffer that can be directly operated upon by a plurality of processes, for instance, running on different cores on the compute node. A shared counter is used for one or more of signaling arrival of the data across the plurality of processes running on the compute node, signaling completion of an operation performed by one or more of the plurality of processes, obtaining reservation slots by one or more of the plurality of processes, or combinations thereof.

  20. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  1. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  2. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  3. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  4. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  5. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  6. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  7. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  8. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  9. Voluntary Protection Program Onsite Review, National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  10. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers [EERE]

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  11. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  12. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  13. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  14. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    SciTech Connect (OSTI)

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  15. Office of Electricity Delivery and Energy Reliability Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Selections | Department of Energy and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise Global Forum, U.S. Energy Secretary Steven Chu today announced the investment of more than $30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects represent a significant

  16. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  17. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  18. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  19. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  20. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  1. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  2. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  3. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  4. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  5. Security Cases | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    raised concerns about the individual's eligibility to maintain a security clearance. ... and (l), the individual's security clearance was suspended, and he requested a hearing. ...

  6. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  7. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  8. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  9. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  10. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  11. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  12. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  15. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  16. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  18. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  19. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  20. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  1. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  2. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  3. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  4. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  5. Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    companies get boost from Los Alamos National Security November 19, 2012 Venture Acceleration Fund awards help region's businesses grow LOS ALAMOS, New Mexico, November 19, 2012- Two local biotech start ups, a water and power company and a hardware inventor are the latest recipients of $165,000 in Venture Acceleration Fund (VAF) awards from Los Alamos National Security, LLC. Mustomo, Inc., IX Power, Synfolia, and Tape-Ease will receive funding to take their products and services to the next

  6. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    200 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 7, 2010 Employee volunteer efforts to be recognized LOS ALAMOS, New Mexico, June 7, 2010-Nonprofit organizations are receiving more than $117,000 from Los Alamos National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits as a result of the volunteer efforts of Los Alamos National

  7. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  8. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  9. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  10. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect (OSTI)

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  11. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  12. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  13. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  14. Process Control System Cyber Security Standards - An Overview

    SciTech Connect (OSTI)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  15. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  16. Global-Address Space Networking (GASNet) Library

    Energy Science and Technology Software Center (OSTI)

    2011-04-06

    GASNet (Global-Address Space Networking) is a language-independent, low-level networking layer that provides network-independent, high-performance communication primitives tailored for implementing parallel global address space SPMD languages such as UPC and Titanium. The interface is primarily intended as a compilation target and for use by runtime library writers (as opposed to end users), and the primary goals are high performance, interface portability, and expressiveness. GASNet is designed specifically to support high-performance, portable implementations of global address spacemore » languages on modern high-end communication networks. The interface provides the flexibility and extensibility required to express a wide variety of communication patterns without sacrificing performance by imposing large computational overheads in the interface. The design of the GASNet interface is partitioned into two layers to maximize porting ease without sacrificing performance: the lower level is a narrow but very general interface called the GASNet core API - the design is basedheavily on Active Messages, and is implemented directly on top of each individual network architecture. The upper level is a wider and more expressive interface called GASNet extended API, which provides high-level operations such as remote memory access and various collective operations. This release implements GASNet over MPI, the Quadrics "elan" API, the Myrinet "GM" API and the "LAPI" interface to the IBM SP switch. A template is provided for adding support for additional network interfaces.« less

  17. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  18. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  19. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Office of Secure Transportation The Office of Secure Transportation (OST) is managed by the National Nuclear Security Administration within the U. S. Department of Energy. OST is responsible for the safe and secure transport in the contiguous United States of government-owned special nuclear materials. These classified shipments can contain nuclear weapons or components, enriched uranium, or plutonium. The cargo is transported in highly modified secure tractor-trailers and escorted

  20. nevada national security site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nevada national security site NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T

  1. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  2. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  3. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  4. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  5. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  6. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  7. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  8. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  9. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  10. Headquarters Security Quick Reference Book

    Office of Energy Efficiency and Renewable Energy (EERE)

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  11. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  12. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    & III-4) ......9 * Classified Information Security Noncompliance ... * Additional Guidance Unique to Classified Information Security Enforcement ...

  13. Safety and Security Interface Technology Initiative

    SciTech Connect (OSTI)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  14. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  15. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  16. Biological and Chemical Security

    SciTech Connect (OSTI)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  17. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  18. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  19. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified

  20. Italy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Italy NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of

  1. NOTICE TO SUPPLIERS Fraudulent Quote Requests/Purchase Order E-Mail Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    * The email message may be poorly written, with misspellings and awkward sentence structure. * The sender's email address is not the same as CNS standard email address domain. The email address domain for Y-12: xxx@y12.doe.gov, for Pantex: xxx@pantex.com. Email from either site may also be in this form: xxx@cns.doe.gov. * The message and purchase order requests shipment/delivery of products to non-CNS facilities. * The message will include an attachment that is designed to look like a purchase

  2. NOTICE TO SUPPLIERS Fraudulent Quote Requests/Purchase Order E-Mail Activity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

     The email message may be poorly written, with misspellings and awkward sentence structure.  The senders email address is not the same as CNS standard email address domain. The email address domain for Y-12: xxx@y12.doe.gov, for Pantex: xxx@pantex.com.  The message and purchase order requests shipment/delivery of products to non-CNS facilities.  The message will include an attachment that is designed to look like a purchase order, and includes a logo or other graphic, and a signature

  3. Secure content objects

    DOE Patents [OSTI]

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  4. Secure Control Systems for the Energy Sector

    SciTech Connect (OSTI)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  5. Framework for Address Cooperative Extended Transactions

    Energy Science and Technology Software Center (OSTI)

    1997-12-01

    The Framework for Addressing Cooperative Extended Transactions (FACET) is an object-oriented software framework for building models of complex, cooperative behaviors of agents. it can be used to implement simulation models of societal processes such as the complex interplay of participating individuals and organizations engaged in multiple concurrent transactions in pursuit of their various goals. These transactions can be patterned on, for example, clinical guidelines and procedures, business practices, government and corporate policies, etc. FACET canmore » also address other complex behaviors such as biological life cycles or manufacturing processes. FACET includes generic software objects representing the fundamental classes of agent -- Person and Organization - with mechanisms for resource management, including resolution of conflicting requests for participation and/or use of the agent's resources. The FACET infrastructure supports stochastic behavioral elements and coping mechanisms by which specified special conditions and events can cause an active cooperative process to be preempted, diverting the participants onto appropriate alternative behavioral pathways.« less

  6. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  7. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  8. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  9. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land - Surrounded by 4,500 square

  10. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  11. Organizing electronic services into security taxonomies - revised

    SciTech Connect (OSTI)

    Smith, S.W.; Pedersen, P.S.

    1997-01-01

    With increasing numbers of commercial and government services being considered for electronic delivery, effective vulnerability analysis will become increasingly critical, Organizing sets of proposed electronic services into security taxonomies will be a key part of this work. However, brute force enumeration of services and risks is inefficient, and ad hoc methods require re-invention with each new set of services. Furthermore, both such approaches fail to communicate effectively the tradeoffs between vulnerabilities and features in a set of electronic services, and fail to scale to large sets of service. From our experience advising players considering electronic delivery, we have developed a general, systematic, and scalable methodology that addresses these concerns. In this paper, we present this methodology, and apply it to the example of electronic services offered via kiosks (since kiosk systems are representative of a wide range of security issues in electronic commerce).

  12. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  13. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  14. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  16. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  17. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  18. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  1. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  3. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  4. U-235: Microsoft Security Bulletin Advance Notification for August 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for August 2012. Microsoft has posted 5 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on August 15, 2012, at 11:00 AM Pacific Time (US & Canada).

  5. U-256: Microsoft Security Bulletin Advance Notification for September 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12, 2012, at 11:00 AM Pacific Time (US & Canada).

  6. U-209: Microsoft Security Bulletin Advance Notification for July 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for July 2012. Microsoft has posted 3 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on July 11, 2012, at 11:00 AM Pacific Time (US & Canada).

  7. U-189: Microsoft Security Bulletin Advance Notification for June 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for June2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on May 13, 2012, at 11:00 AM Pacific Time (US & Canada).

  8. U-145: Microsoft Security Bulletin Summary for April 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada).

  9. U-278: Microsoft Security Bulletin Advance Notification for October 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for October 2012. Microsoft has posted 1 Critical Bulletins and 6 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on October 10, 2012, at 11:00 AM Pacific Time (US & Canada).

  10. U-124: Microsoft Security Bulletin Advance Notification for March 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on March 14, 2012, at 11:00 AM Pacific Time (US & Canada).

  11. U-164: Microsoft Security Bulletin Advance Notification for May 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on May 8, 2012, at 11:00 AM Pacific Time (US & Canada).

  12. U-103: Microsoft Security Bulletin Advance Notification for February 2012

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for February 2012. Microsoft has posted 6 Critical Bulletins and 5 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on February 15, 2012, at 11:00 AM Pacific Time (US & Canada).

  13. Recommended Practices Guide For Securing ZigBee Wireless Networks in

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Process Control System Environments | Department of Energy Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments This paper addresses design principles and best practices regarding the secure implementation and operation of ZigBee wireless networks. ZigBee is a protocol specification and industry standard for a type of wireless

  14. Modeling and simulation for cyber-physical system security research, development and applications.

    SciTech Connect (OSTI)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  15. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 0930...

  16. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  17. Nuclear Security 101 | National Nuclear Security Administration | (NNSA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security 101 March 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material, technology and expertise or radioactive material. Successful nuclear security relies on the integration of technology, policy, operational concepts and international collaboration to prevent acts of nuclear terrorism. The Basics of Nuclear Security include: Removing or Eliminating Highly Enriched Uranium (HEU) and

  18. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site August 23, 2010 The primary mission of the National Nuclear Security Administration (NNSA) is to maintain the safety, security and effectiveness of the nation's nuclear deterrent through surveillance programs and life extension campaigns. Exercising the skills and capabilities required to accomplish that mission provide the nation with a unique capability to support a wide variety of additional national security missions. To maximize this potential, NNSA

  19. Y-12 National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Campus Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  20. Opportunities for Building America Research to Address Energy...

    Energy Savers [EERE]

    Opportunities for Building America Research to Address Energy Upgrade Technical Challenges: HVAC, Envelope and IAQ (301) Opportunities for Building America Research to Address...

  1. Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges ...

  2. Addressing Uncertainties in Design Inputs: A Case Study of Probabilist...

    Office of Environmental Management (EM)

    Addressing Uncertainties in Design Inputs: A Case Study of Probabilistic Settlement Evaluations for Soft Zone Collapse at SWPF Addressing Uncertainties in Design Inputs: A Case ...

  3. Energy-Intensive Processes Portfolio: Addressing Key Energy Challenges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy-Intensive Processes Portfolio: Addressing Key Energy Challenges Across U.S. Industry Energy-Intensive Processes Portfolio: Addressing Key Energy Challenges Across U.S. ...

  4. Addressable morphology control of silica structures by manipulating...

    Office of Scientific and Technical Information (OSTI)

    Addressable morphology control of silica structures by manipulating the reagent addition time Citation Details In-Document Search Title: Addressable morphology control of silica ...

  5. ASHRAE draft regarding Smart Grid RFI: Addressing Policy and...

    Energy Savers [EERE]

    ASHRAE draft regarding Smart Grid RFI: Addressing Policy and Logistical Challenges ASHRAE draft regarding Smart Grid RFI: Addressing Policy and Logistical Challenges The American ...

  6. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by ...

  7. DOE Action Plan Addressing the Electricity Transmission System

    Broader source: Energy.gov (indexed) [DOE]

    U.S. DEPARTMENT OF ENERGY ACTION PLAN ADDRESSING THE ELECTRICITY TRANSMISSION SYSTEM DRAFT DOE Action Plan Addressing the Electricity Transmission System 1 Table of Contents * ...

  8. NERSC Implements Organizational Changes to Better Address Evolving...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizational Changes to Better Address Evolving Data Environment NERSC Implements Organizational Changes to Better Address Evolving Data Environment February 23, 2015 Contact: ...

  9. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation ...

  10. Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges Pepco Holdings, Inc. ...

  11. Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Implementation Okaloosa Gas District Smart Grid RFI: Addressing Policy and ...

  12. Energy Department Addresses Largest Gathering of Geothermal Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses Largest Gathering of Geothermal Energy Stakeholders Energy Department Addresses Largest Gathering of Geothermal Energy Stakeholders October 4, 2012 - 1:00pm Addthis Photo ...

  13. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  14. Strategies to Address Split Incentives in Multifamily Buildings...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Address Split Incentives in Multifamily Buildings Strategies to Address Split Incentives in Multifamily Buildings Better Buildings Neighborhood Program Multifamily Low-Income ...

  15. Smart Grid RFI: Addressing Policy and Logistical Challenges....

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the...

  16. Bush Administration Plays Leading Role in Studying and Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bush Administration Plays Leading Role in Studying and Addressing Global Climate Change Bush Administration Plays Leading Role in Studying and Addressing Global Climate Change...

  17. Policy Agenda for Addressing Climate Change in Bangladesh: Copenhagen...

    Open Energy Info (EERE)

    Agenda for Addressing Climate Change in Bangladesh: Copenhagen and Beyond Jump to: navigation, search Name Policy Agenda for Addressing Climate Change in Bangladesh: Copenhagen and...

  18. Indonesia National Action Plan Addressing Climate Change | Open...

    Open Energy Info (EERE)

    National Action Plan Addressing Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Indonesia National Action Plan Addressing Climate Change AgencyCompany...

  19. Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy and ...

  20. Cynthia J. Jenks Work Address: Home Address: Ames Laboratory 3101 Greenwood Rd.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyclotron Road at Berkeley Lab Cyclotron Road at Berkeley Lab Addthis The Department of Energy is testing a new model for clean energy research and development (R&D) through a program called Cyclotron Road. The goal is to support scientific R&D that is still too risky for private-sector investment, and too applied for academia

    J. Jenks Work Address: Home Address: Ames Laboratory 3101 Greenwood Rd. 311 TASF Ames, IA 50014 2408 Pammel Drive Cell: (515) 451-4663 Iowa State University