National Library of Energy BETA

Sample records for management vulnerability assessment

  1. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  2. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  3. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  4. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  5. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  6. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  7. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  8. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  9. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  10. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  11. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  12. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  13. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  14. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  15. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management ...

  16. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  17. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  18. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  19. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection

  20. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  1. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  2. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  3. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release

  4. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  5. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  6. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  7. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  8. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  9. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  10. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  11. Enterprise Assessments Emergency Management Assessment of the...

    Office of Environmental Management (EM)

    Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 Enterprise Assessments Emergency Management Assessment of the Waste Isolation Pilot Plant - April ...

  12. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  13. Risk Assessment & Management Information

    Broader source: Energy.gov [DOE]

    NRC - A Proposed Risk Management Regulatory Framework, April 2012 Risk Assessment Technical Experts Working Group (RWG) web page DOE Standard on Development and Use of Probabilistic Risk Assessment in DOE Nuclear Safety Applications (draft), December 2010 Consortium for Risk Evaluation with Stakeholder Participation Workshop on Risk Assessment and Safety Decision Making Under Uncertainty

  14. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  15. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  16. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  17. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  18. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  19. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  20. Performing Energy Security Assessments: A How-To Guide for Federal Facility Managers

    Broader source: Energy.gov [DOE]

    Guide describes the best practices and recommended process for federal facility managers to prepare for the following sections of a facility’s energy security plan: vulnerability assessments, energy preparedness and operations plans, and remedial action plans.

  1. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  2. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  3. Quality Procedure - Management Assessment and Self-Assessment | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Management Assessment and Self-Assessment Quality Procedure - Management Assessment and Self-Assessment This procedure establishes the roles, responsibilities, requirements, and process for conducting Environmental Management (EM) Office of Standards and Quality Assurance management assessments and self-assessments. Effective management assessments and self-assessments are built on self-evaluation, work process analysis, clear communication with management, and honest feedback that

  4. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  5. INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER...

    Office of Scientific and Technical Information (OSTI)

    INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE ... Title: INDEPENDENT TECHNICAL ASSESSMENT OF MANAGEMENT OF STORMWATER AND WASTEWATER AT THE ...

  6. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  7. Office of Project Management Oversight & Assessments | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Office of Project Management Oversight & Assessments Career Development Project Management Career Development Program (DOE Only) Acquisition Career Management Program (DOE Only)...

  8. Enterprise Assessments Emergency Management Assessment of the Waste

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Isolation Pilot Plant - April 2016 | Department of Energy Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 Enterprise Assessments Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 April 2016 Emergency Management Assessment of the Waste Isolation Pilot Plant - April 2016 The Office of Emergency Management Assessments, within the U.S. Department of Energy (DOE) independent Office of Enterprise Assessments (EA), conducted an

  9. CRAD, Configuration Management Assessment Plan

    Broader source: Energy.gov [DOE]

    The objective of this assessment is to determine whether a Configuration Management Program (CM) is in place which allows for the availability and retrievability of accurate information, improves response to design and operational decisions, enhances worker safety, increases facility safety and reliability, increases efficiency of work efforts, and helps maintain integrity of interfacing orders.

  10. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  11. Risk Assessment/Management Tool

    Energy Science and Technology Software Center (OSTI)

    2010-12-31

    RAMTool performs the following: • A tool to perform facility and programmatic risk assessments, produce risk registers, develop risk management plans (RMPs), link risks to improvement/risk-reduction projects, and actively manage risks • Ability to conduct risk assessments. Ease of determination of probability and consequence based on industry standard risk matrices. Complies with site risk management performance document. Provides multiple outputs/report for required risk forms. Conduct quick risk data analysis. • Performs/calculates a facility risk factormore » (RF) and a programmatic RF. Supports project and initiative prioritization and funding in order to make solid decisions on risk reduction. Assigns responsibility and accountability at a risk owner (RO) level. Monitors and tracks progress toward completing mitigation strategies. Ability to import massive amounts of data at the push of a button. Integrates development of a Risk Management Plan (RMP) Built for ease-of-use – design, built, and used by technical/management personnel. Can be customized (functions and/or reports) for further analysis« less

  12. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  13. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  14. Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify

  15. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  16. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  17. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    SciTech Connect (OSTI)

    Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge

  18. Enterprise Assessments Review of Radioactive Waste Management...

    Energy Savers [EERE]

    Gaseous Diffusion Plant - December 2015 Enterprise Assessments Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant - December 2015 December ...

  19. Management Assessment and Independent Assessment Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-31

    The revision to this Guide reflects current assessment practices, international standards, and changes in the Department of Energy expectations. Cancels DOE G 414.1-1. Canceled by DOE G 414.1-1B.

  20. Manager's Signature Log Privacy Impact Assessment, Office of...

    Office of Environmental Management (EM)

    Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's ...

  1. Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Federick T.; Schlicher, Bob G

    2015-01-01

    There are many influencing economic factors to weigh from the defender-practitioner stakeholder point-of-view that involve cost combined with development/deployment models. Some examples include the cost of countermeasures themselves, the cost of training and the cost of maintenance. Meanwhile, we must better anticipate the total cost from a compromise. The return on investment in countermeasures is essentially impact costs (i.e., the costs from violating availability, integrity and confidentiality / privacy requirements). The natural question arises about choosing the main risks that must be mitigated/controlled and monitored in deciding where to focus security investments. To answer this question, we have investigated the cost/benefits to the attacker/defender to better estimate risk exposure. In doing so, it s important to develop a sound basis for estimating the factors that derive risk exposure, such as likelihood that a threat will emerge and whether it will be thwarted. This impact assessment framework can provide key information for ranking cybersecurity threats and managing risk.

  2. Management and Independent Assessments Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-03-27

    The Guide reflects updated standards for assessment practices, international standards, and changes in DOE expectations related to quality assurance (QA). Supersedes DOE G 414.1-1B.

  3. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  4. V-094: IBM Multiple Products Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple ...

  5. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  6. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  7. Assessing waste management systems using reginalt software

    SciTech Connect (OSTI)

    Meshkov, N.K.; Camasta, S.F.; Gilbert, T.L.

    1988-03-01

    A method for assessing management systems for low-level radioactive waste is being developed for US Department of Energy. The method is based on benefit-cost-risk analysis. Waste management is broken down into its component steps, which are generation, treatment, packaging, storage, transportation, and disposal. Several different alternatives available for each waste management step are described. A particular waste management system consists of a feasible combination of alternatives for each step. Selecting an optimal waste management system would generally proceed as follows: (1) qualitative considerations are used to narrow down the choice of waste management system alternatives to a manageable number; (2) the costs and risks for each of these system alternatives are evaluated; (3) the number of alternatives is further reduced by eliminating alternatives with similar risks but higher costs, or those with similar costs but higher risks; (4) a trade-off factor between cost and risk is chosen and used to compute the objective function (sum of the cost and risk); and (5) the selection of the optimal waste management system among the remaining alternatives is made by choosing the alternative with the smallest value for the objective function. The authors propose that the REGINALT software system, developed by EG and G Idaho, Inc., as an acid for managers of low-level commerical waste, be augmented for application to the managment of DOE-generated waste. Specific recommendations for modification of the REGINALT system are made. 51 refs., 3 figs., 2 tabs.

  8. Assessing the Labor-Management Relationship

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Labor-Management Relationship This report contains results and analysis of a survey that was issued to labor-management relations (LMR) personnel among all organizations/unions at the U.S. Department of Energy during August 2013. The goal of the survey is to assess the overall perceived effectiveness of LMR programs and to find potential target areas for improvement. The survey is comprised of 19 questions. Of these, 12 are subjective with the multiple choice answers: Strongly Agree, Agree,

  9. Enterprise Assessments Lessons Learned from the 2015 Emergency Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments - May 2016 | Department of Energy from the 2015 Emergency Management Assessments - May 2016 Enterprise Assessments Lessons Learned from the 2015 Emergency Management Assessments - May 2016 June 2016 Lessons Learned from the 2015 Emergency Management Assessments The Office of Emergency Management Assessments, within the Office of Enterprise Assessments (EA), evaluates specific areas of interest at U.S. Department of Energy (DOE) facilities. EA based this report on an overview of

  10. Office of Emergency Management Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Emergency Management Assessments Office of Emergency Management Assessments MISSION The Office of Emergency Management Assessments conducts assessments to provide critical feedback and objective information on emergency management programs and performance. This information provides assurance to our stakeholders and identifies areas for improvement to our leadership to support the safe performance of the Department's mission. FUNCTIONS Conducts oversight of the adequacy of DOE emergency

  11. Enterprise Assessments Lessons Learned from the 2015 Emergency Management Assessments … May 2016

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lessons Learned from the 2015 Emergency Management Assessments May 2016 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ..................................................................................................................................................... ii Executive Summary

  12. The Environmental Assessment Management modification of CADET

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The original CADET system (finalized in September 1995 as version 1.3) is a data collection and transfer system developed for the Headquarters Air Force Space Command (HQAFSPC) Environmental Compliance Assessment and Management Program (ECAMP). The system was designed as a tool for ECAMP evaluators to use to enter compliance related data while in the field and to subsequently store, modify, sort, query, and print the data and to electronically transfer the data into the Airmore » Force''s Work Information Management System Environmental Subsystem (WIMSES). The original CADET system was designed to match the database structure of the WIMSES ECAMP module that came on-line in 1992. In June 1995, the Department of Defense issued The Environmental Assessment Management (TEAM) Guide and ECAMP Supplement to the TEAM Guide. These included changes to the type and amount of data collected during an ECAMP assessment. The WIMSES database structure was not modified to match the TEAM Guide; however, the need for collecting and storing the ECAMP data remained. The HQAFSC decided to modify the CADET system to incorporate the changes specified in the ECAMP Supplement and to convert the system from simply a data entry and transfer tool to a data entry and storage system to manage ECAMP findings in lieu of the WIMSES ECAMP module. The revised software is designated as version 2.0 and nicknamed TEAM CADET to distinguish it from the original CADET system.« less

  13. Cryptographic Key Management and Critical Risk Assessment

    SciTech Connect (OSTI)

    Abercrombie, Robert K

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  14. Enterprise Assessments, Lessons Learned from the 2014 Emergency Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Reviews - April 2015 | Department of Energy the 2014 Emergency Management Reviews - April 2015 Enterprise Assessments, Lessons Learned from the 2014 Emergency Management Reviews - April 2015 April 2015 Lessons Learned from the 2014 Emergency Management Reviews The Office of Emergency Management Assessments, within the U.S. Department of Energy's independent Office of Enterprise Assessments (EA), Office of Environment, Safety and Health Assessments, conducted emergency management reviews at

  15. Manager's Signature Log Privacy Impact Assessment, Office of Science

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Chicago Office | Department of Energy Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office Manager's Signature Log Privacy Impact Assessment, Office of Science Chicago Office (110.12 KB) More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National

  16. Enterprise Assessments Review of the Pantex Plant Emergency Management...

    Office of Environmental Management (EM)

    the Pantex Plant Emergency Management Exercise Program - November 2015 Enterprise Assessments Review of the Pantex Plant Emergency Management Exercise Program - November 2015 ...

  17. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... systems in hydroelectric dams; water treatment systems; electric power transmission, distribution, and generation; petroleum storage and refineries; and transportation systems. ...

  18. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... to increase power grid reliability and resilience, but also provides adversaries with the ... in industrial control systems for electricity generationtransmissiondistribution ...

  19. NDE to Manage Atmospheric SCC in Canisters for Dry Storage of Spent Fuel: An Assessment

    SciTech Connect (OSTI)

    Meyer, Ryan M.; Pardini, Allan F.; Cuta, Judith M.; Adkins, Harold E.; Casella, Andrew M.; Qiao, Hong; Larche, Michael R.; Diaz, Aaron A.; Doctor, Steven R.

    2013-09-01

    This report documents efforts to assess representative horizontal (Transuclear NUHOMS®) and vertical (Holtec HI-STORM) storage systems for the implementation of non-destructive examination (NDE) methods or techniques to manage atmospheric stress corrosion cracking (SCC) in canisters for dry storage of used nuclear fuel. The assessment is conducted by assessing accessibility and deployment, environmental compatibility, and applicability of NDE methods. A recommendation of this assessment is to focus on bulk ultrasonic and eddy current techniques for direct canister monitoring of atmospheric SCC. This assessment also highlights canister regions that may be most vulnerable to atmospheric SCC to guide the use of bulk ultrasonic and eddy current examinations. An assessment of accessibility also identifies canister regions that are easiest and more difficult to access through the ventilation paths of the concrete shielding modules. A conceivable sampling strategy for canister inspections is to sample only the easiest to access portions of vulnerable regions. There are aspects to performing an NDE inspection of dry canister storage system (DCSS) canisters for atmospheric SCC that have not been addressed in previous performance studies. These aspects provide the basis for recommendations of future efforts to determine the capability and performance of eddy current and bulk ultrasonic examinations for atmospheric SCC in DCSS canisters. Finally, other important areas of investigation are identified including the development of instrumented surveillance specimens to identify when conditions are conducive for atmospheric SCC, characterization of atmospheric SCC morphology, and an assessment of air flow patterns over canister surfaces and their influence on chloride deposition.

  20. Bonneville - Hood River Vegetation Management Environmental Assessment

    SciTech Connect (OSTI)

    N /A

    1998-08-01

    To maintain the reliability of its electrical system, BPA, in cooperation with the U.S. Forest Service, needs to expand the range of vegetation management options used to clear unwanted vegetation on about 20 miles of BPA transmission line right-of-way between Bonneville Dam and Hood River; Oregon, within the Columbia Gorge National Scenic Area (NSA). We propose to continue controlling undesirable vegetation using a program of Integrated Vegetation Management (IVM) which includes manual, biological and chemical treatment methods. BPA has prepared an Environmental Assessment (EA) (DOE/EA-1257) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required and BPA is issuing this FONSI.

  1. Radioactive Waste Management Complex performance assessment: Draft

    SciTech Connect (OSTI)

    Case, M.J.; Maheras, S.J.; McKenzie-Carter, M.A.; Sussman, M.E.; Voilleque, P.

    1990-06-01

    A radiological performance assessment of the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory was conducted to demonstrate compliance with appropriate radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the general public. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the general public via air, ground water, and food chain pathways. Projections of doses were made for both offsite receptors and individuals intruding onto the site after closure. In addition, uncertainty analyses were performed. Results of calculations made using nominal data indicate that the radiological doses will be below appropriate radiological criteria throughout operations and after closure of the facility. Recommendations were made for future performance assessment calculations.

  2. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    SciTech Connect (OSTI)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energys National Energy Technology Laboratory, the Blowout and Spill Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.

  3. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    SciTech Connect (OSTI)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spill Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.

  4. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spillmore » Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.« less

  5. Office of Project Management Oversight & Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Project Management Oversight & Assessments 2015 Project Management Award Winners 2015 Project Management Award Winners The annual DOE Project Management Workshop provides an opportunity to recognize and reward excellence in project management across the complex. This Year, the Department recognized eight (8) individual and team successes in project management. Award presentations were made by Elizabeth Sherwood-Randall, Deputy Secretary of Energy. Read more FPD Resource Center FPD

  6. DOE's New Checklist Helps Plants Assess Energy Management Activities

    Broader source: Energy.gov [DOE]

    DOE developed the Strategic Energy Management Checklist to help manufacturing facilities conduct a high-level assessment of their energy management practices and identify opportunities to achieve greater energy savings.

  7. Assessing the Labor-Management Relationship

    Office of Environmental Management (EM)

    ... CBA..." "Everyone seems to be working in secret." "Feels like they got together and ... to discipline lower level management...". "Top management can't even get their own ...

  8. Independent Oversight Assessment, DOE Office of Environmental Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Headquarters - November 2012 | Department of Energy DOE Office of Environmental Management Headquarters - November 2012 Independent Oversight Assessment, DOE Office of Environmental Management Headquarters - November 2012 November 2012 Assessment of Safety Culture at the U.S. Department of Energy Office of Environmental Management Headquarters This report provides the results of an independent assessment of the safety culture at the Department of Energy's (DOE) Office of Environmental

  9. Enterprise Assessments Emergency Management Assessment of the Waste Isolation Pilot Plant … April 2016

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Emergency Management Assessment of the Waste Isolation Pilot Plant April 2016 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  10. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  11. Office of Emergency Management Assessments | Department of Energy

    Office of Environmental Management (EM)

    worker safety and health and nuclear safety requirements that are enforceable under 10 CFR 851 and 10 CFR 820. Leadership Emergency Management Assessments Gerald McAteer, Director ...

  12. PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop

    Energy Savers [EERE]

    Theron McGriff, Technical Lead Integrated Safety Management System 208-526-9859 Purpose of Registration and on-line payment web site for Integrated Safety Management Infonnatlon ...

  13. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  14. Environmental Management Assessment of the National Renewable Energy Laboratory (NREL)

    SciTech Connect (OSTI)

    Not Available

    1993-09-01

    This report documents the results of the environmental management assessment performed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. The onsite portion of the assessment was conducted from September 14 through September 27, 1993, by DOE`s Office of Environmental Audit (EH-24) located within the Office of the Assistant Secretary for Environment, Safety, and Health (EH-1). During this assessment, the activities conducted by the assessment team included reviews of internal documents and reports from previous audits and assessments; interviews with US Department of Energy (DOE) and NREL contractor personnel; and inspections and observations of selected facilities and operations. The environmental management assessment of NREL focused on the adequacy of environmental management systems and assessed the formality of programs employing an approach that recognizes the level of formality implementing environmental programs may vary commensurate with non-nuclear research and development operations. The Assessment Team evaluated environmental monitoring, waste management and National Environmental Policy Act (NEPA) activities at NREL, from a programmatic standpoint. The results of the evaluation of these areas are contained in the Environmental Protection Programs section of this report. The scope of the NREL Environmental Management Assessment was comprehensive and included all areas of environmental management. At the same time, environmental monitoring, waste management, and NEPA activities were evaluated to develop a programmatic understanding of these environmental disciplines, building upon the results of previous appraisals, audits, and reviews performed at the NREL.

  15. Enterprise Assessments Review of Radioactive Waste Management at the

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portsmouth Gaseous Diffusion Plant - December 2015 | Department of Energy Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant - December 2015 Enterprise Assessments Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant - December 2015 December 2015 Review of Radioactive Waste Management at the Portsmouth Gaseous Diffusion Plant The U.S. Department of Energy (DOE) Office of Nuclear Safety and Environmental Assessments, within the

  16. Hanford Site Waste Management Area C Performance Assessment (PA) Current

    Office of Environmental Management (EM)

    Status | Department of Energy Assessment (PA) Current Status Hanford Site Waste Management Area C Performance Assessment (PA) Current Status Marcel Bergeron Washignton River Protection Solutions Alaa Aly INTERA Performance and Risk Assessment Community of Practice Technical Exchange December 11-12, 2014 To view all the P&RA CoP 2014 Technical Exchange Meeting videos click here. Video Presentation - Part 1 Video Presentation - Part 2 Hanford Site Waste Management Area C Performance

  17. Assessment of light water reactor accident management programs and experience

    SciTech Connect (OSTI)

    Hammersley, R.J.

    1992-03-01

    The objective of this report is to provide an assessment of the current light water reactor experience regarding accident management programs and associated technology developments. This assessment for light water reactor (LWR) designs is provided as a resource and reference for the development of accident management capabilities for the production reactors at the Savannah River Site. The specific objectives of this assessment are as follows: 1. Perform a review of the NRC, utility, and industry (NUMARC, EPRI) accident management programs and implementation experience. 2. Provide an assessment of the problems and opportunities in developing an accident management program in conjunction or following the Individual Plant Examination process. 3. Review current NRC, utility, and industry technological developments in the areas of computational tools, severe accident predictive tools, diagnostic aids, and severe accident training and simulation.

  18. Risk assessment and management of radiofrequency radiation exposure

    SciTech Connect (OSTI)

    Dabala, Dana; Surducan, Emanoil; Surducan, Vasile; Neamtu, Camelia

    2013-11-13

    Radiofrequency radiation (RFR) industry managers, occupational physicians, security department, and other practitioners must be advised on the basic of biophysics and the health effects of RF electromagnetic fields so as to guide the management of exposure. Information on biophysics of RFR and biological/heath effects is derived from standard texts, literature and clinical experiences. Emergency treatment and ongoing care is outlined, with clinical approach integrating the circumstances of exposure and the patient's symptoms. Experimental risk assessment model in RFR chronic exposure is proposed. Planning for assessment and monitoring exposure, ongoing care, safety measures and work protection are outlining the proper management.

  19. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    '" " * .1 * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FREEDOM OF INFORMAnON ACT/ PRIVACY ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf

  20. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    .. ,. - -i * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FERNALD HISTORICAL RECORDS SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete

  1. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    :-. ., ,-- -.' * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ELECTRONIC RECORDS KEEPING SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1. Department of Energy Privacy Program, Appendix A. Privacy Impact Assessments. for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please

  2. NGNP Risk Management through Assessing Technology Readiness

    SciTech Connect (OSTI)

    John W. Collins

    2010-08-01

    Throughout the Next Generation Nuclear Plant (NGNP) project life cycle, technical risks are identified, analyzed, and mitigated and decisions are made regarding the design and selection of plant and sub-system configurations, components and their fabrication materials, and operating conditions. Risk resolution and decision making are key elements that help achieve project completion within budget and schedule constraints and desired plant availability. To achieve this objective, a formal decision-making and risk management process was developed for NGNP, based on proven systems engineering principles that have guided aerospace and military applications.

  3. Environmental Assessment : Squawfish Management Program : Final.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    1992-05-01

    Bonneville Power Administration (BPA) proposes to decrease the number of northern squawfish (Ptychocheilus oregonensis) in reservoirs in the Columbia River system. The goal of the Squawfish Management Program is to reduce losses of outmigrating juvenile salmon and steelhead (salmonids) to northern squawfish predation. The objective is to reduce the number of northern squawfish that feed on juvenile salmonids (smolts) by 10 to 20 percent to alter the age and size structure of the northern squawfish population. The hypothesis, based on computer modeling, indicates that sustained northern squawfish harvest (5 to 10 years) and the resultant population restructuring may reduce losses of juvenile salmonids to predation by up to 50 percent or more within 10 years. The proposed action would target northern squawfish 11 inches and longer, the size in which northern squawfish being preying significantly on juvenile salmonids. BPA proposes to fund three types of fisheries to harvest northern squawfish. BPA also proposes to fund monitoring activities of these fisheries to determine whether desired or other results occur. The three fisheries methods proposed are: (1) commercial Tribal fishing; (2) sport reward fishing; and (3) fishing from restricted areas of each dam ( dam angling''). These fisheries were tested in 1990 and 1991.

  4. Enterprise Assessments Targeted Review of the Safety System Management of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility - December 2015 | Department of Energy System Management of the Secondary Confinement System and Power Distribution Safety System at the Y-12 National Security Complex Highly Enriched Uranium Materials Facility - December 2015 Enterprise Assessments Targeted Review of the Safety System Management of the Secondary Confinement System and Power

  5. PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ENERGY EMPLOYEES OCCUPATIONAL ILLNESS COMPENSATION PROGRAM ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  7. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  8. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events

  9. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the

  10. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  11. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  12. Conceptualising and managing trade-offs in sustainability assessment

    SciTech Connect (OSTI)

    Morrison-Saunders, Angus; Pope, Jenny

    2013-01-15

    One of the defining characteristics of sustainability assessment as a form of impact assessment is that it provides a forum for the explicit consideration of the trade-offs that are inherent in complex decision-making processes. Few sustainability assessments have achieved this goal though, and none has considered trade-offs in a holistic fashion throughout the process. Recent contributions such as the Gibson trade-off rules have significantly progressed thinking in this area by suggesting appropriate acceptability criteria for evaluating substantive trade-offs arising from proposed development, as well as process rules for how evaluations of acceptability should occur. However, there has been negligible uptake of these rules in practice. Overall, we argue that there is inadequate consideration of trade-offs, both process and substantive, throughout the sustainability assessment process, and insufficient considerations of how process decisions and compromises influence substantive outcomes. This paper presents a framework for understanding and managing both process and substantive trade-offs within each step of a typical sustainability assessment process. The framework draws together previously published literature and offers case studies that illustrate aspects of the practical application of the framework. The framing and design of sustainability assessment are vitally important, as process compromises or trade-offs can have substantive consequences in terms of sustainability outcomes delivered, with the choice of alternatives considered being a particularly significant determinant of substantive outcomes. The demarcation of acceptable from unacceptable impacts is a key aspect of managing trade-offs. Offsets can be considered as a form of trade-off within a category of sustainability that are utilised to enhance preferred alternatives once conditions of impact acceptability have been met. In this way they may enable net gains to be delivered; another imperative

  13. How social impact assessment can contribute to conflict management

    SciTech Connect (OSTI)

    Prenzel, Paula V. Vanclay, Frank

    2014-02-15

    The potential for conflict is omnipresent in all projects, and even in all human interactions, and conflict itself leads to many second-order social impacts. This article examines the contribution of the methodological approach used in social impact assessment (SIA) to conflict management. We view conflict as a process that has its own dynamic, and is to be expected in all situations. By using game theory (prisoner's dilemma), we describe and conceptualize this process and highlight the importance of communication in managing conflict. We demonstrate the potential use of SIA in preventing, managing and resolving conflict. Emphasis is placed on the participatory character of SIA and the role of public media. In contrast to existing literature, our focus is not restricted to the typical fields of study of SIA (e.g. environmental conflicts), but understands conflict itself as a field of application. In this sense, conflict-sensitive SIA can be understood both as an extension to the SIA tool kit and a broadening of the scope of SIA application. -- Highlights: Conflict is omnipresent and creates both positive and negative social impacts. Conflict itself represents a possible field of application for SIA. Conflict escalation is a process that can be modeled in a game-theoretic framework. There needs to be concerted effort to prevent escalation to avoid harmful outcomes. Conflict-sensitive SIA can support conflict management and sustainable resolution.

  14. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. Top 10 Vulnerabilities of

  15. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED

  16. Life cycle assessment of construction and demolition waste management

    SciTech Connect (OSTI)

    Butera, Stefania Christensen, Thomas H.; Astrup, Thomas F.

    2015-10-15

    Highlights: • LCA of C&DW utilisation in road vs. C&DW landfilling. • C&DW utilisation in road better than landfilling for most categories. • Transportation is the most important process in non-toxic impact categories. • Leaching of oxyanions is the critical process in toxic impact categories. • Modelling of Cr fate in the subsoil is highly influential to the results. - Abstract: Life cycle assessment (LCA) modelling of construction and demolition waste (C&DW) management was carried out. The functional unit was management of 1 Mg mineral, source separated C&DW, which is either utilised in road construction as a substitute for natural aggregates, or landfilled. The assessed environmental impacts included both non-toxic and toxic impact categories. The scenarios comprised all stages of the end-of-life management of C&DW, until final disposal of all residues. Leaching of inorganic contaminants was included, as was the production of natural aggregates, which was avoided because of the use of C&DW. Typical uncertainties related to contaminant leaching were addressed. For most impact categories, utilisation of C&DW in road construction was preferable to landfilling; however, for most categories, utilisation resulted in net environmental burdens. Transportation represented the most important contribution for most nontoxic impacts, accounting for 60–95 per cent of these impacts. Capital goods contributed with negligible impacts. Leaching played a critical role for the toxic categories, where landfilling had lower impacts than utilisation because of the lower levels of leachate per ton of C&DW reaching the groundwater over a 100-year perspective. Leaching of oxyanions (As, V and Sb) was critical with respect to leaching. Typical experimental uncertainties in leaching data did not have a pivotal influence on the results; however, accounting for Cr immobilisation in soils as part of the impact assessment was critical for modelling the leaching impacts. Compared

  17. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  18. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  19. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  20. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  1. Enforcement Guidance Supplement 01-02: Management and Independent Assessment

    Office of Energy Efficiency and Renewable Energy (EERE)

    Section 1.3 of the Operational Procedures for Enforcement, published in June 1998, provides the opportunity for the Office of Price-Anderson Enforcement (OE) to periodically issue clarifying guidance regarding the processes used in its enforcement activities. OE typically issues such guidance in the form of Enforcement Guidance Supplements (EGSs), which provide information or recommendations only and impose no requirements or actions on DOE contractors. DOE enforcement activities to date have indicated the need for improvement in contractor compliance with the Management and Independent Assessment (M&IA) requirements of 10 CFR 830.122. This EGS signals an increased emphasis by OE in this area, and describes the general approach that will be used by OE in evaluating compliance of nuclear-safety related M&IA Programs.

  2. Life cycle assessment of bagasse waste management options

    SciTech Connect (OSTI)

    Kiatkittipong, Worapon; Wongsuchoto, Porntip; Pavasant, Prasert

    2009-05-15

    Bagasse is mostly utilized for steam and power production for domestic sugar mills. There have been a number of alternatives that could well be applied to manage bagasse, such as pulp production, conversion to biogas and electricity production. The selection of proper alternatives depends significantly on the appropriateness of the technology both from the technical and the environmental points of view. This work proposes a simple model based on the application of life cycle assessment (LCA) to evaluate the environmental impacts of various alternatives for dealing with bagasse waste. The environmental aspects of concern included global warming potential, acidification potential, eutrophication potential and photochemical oxidant creation. Four waste management scenarios for bagasse were evaluated: landfilling with utilization of landfill gas, anaerobic digestion with biogas production, incineration for power generation, and pulp production. In landfills, environmental impacts depended significantly on the biogas collection efficiency, whereas incineration of bagasse to electricity in the power plant showed better environmental performance than that of conventional low biogas collection efficiency landfills. Anaerobic digestion of bagasse in a control biogas reactor was superior to the other two energy generation options in all environmental aspects. Although the use of bagasse in pulp mills created relatively high environmental burdens, the results from the LCA revealed that other stages of the life cycle produced relatively small impacts and that this option might be the most environmentally benign alternative.

  3. A mathematically guided strategy for risk assessment and management.

    SciTech Connect (OSTI)

    Cooper, James Arlin

    2005-03-01

    Strategies for risk assessment and management of high consequence operations are often based on factors such as physical analysis, analysis of software and other logical processing, and analysis of statistically determined human actions. Conventional analysis methods work well for processing objective information. However, in practical situations, much or most of the data available are subjective. Also, there are potential resultant pitfalls where conventional analysis might be unrealistic, such as improperly using event tree and fault tree failure descriptions where failures or events are soft (partial) rather than crisp (binary), neglecting or misinterpreting dependence (positive, negative, correlation), and aggregating nonlinear contributions linearly. There are also personnel issues that transcend basic human factors statistics. For example, sustained productivity and safety in critical operations can depend on the morale of involved personnel. In addition, motivation is significantly influenced by 'latent effects', which are pre-occurring influences. This paper addresses these challenges and proposes techniques for subjective risk analysis, latent effects risk analysis and a hybrid analysis that also includes objective risk analysis. The goal is an improved strategy for risk management.

  4. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  5. Final Environmental assessment for the Uranium Lease Management Program

    SciTech Connect (OSTI)

    1995-07-01

    The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

  6. Cyber Assessment Methods for SCADA Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the...

  7. Assessment of Disposal Options for DOE-Managed High-Level Radioactive...

    Energy Savers [EERE]

    The Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel report assesses the technical options for the safe and permanent disposal of ...

  8. Taxonomy of USA east coast fishing communities in terms of social vulnerability and resilience

    SciTech Connect (OSTI)

    Pollnac, Richard B.; Seara, Tarsila; Colburn, Lisa L.; Jepson, Michael

    2015-11-15

    Increased concern with the impacts that changing coastal environments can have on coastal fishing communities led to a recent effort by NOAA Fisheries social scientists to develop a set of indicators of social vulnerability and resilience for the U.S. Southeast and Northeast coastal communities. A goal of the NOAA Fisheries social vulnerability and resilience indicator program is to support time and cost effective use of readily available data in furtherance of both social impact assessments of proposed changes to fishery management regulations and climate change adaptation planning. The use of the indicators to predict the response to change in coastal communities would be enhanced if community level analyses could be grouped effectively. This study examines the usefulness of combining 1130 communities into 35 relevant subgroups by comparing results of a numerical taxonomy with data collected by interview methods, a process herein referred to as “ground-truthing.” The validation of the taxonomic method by the method of ground-truthing indicates that the clusters are adequate to be used to select communities for in-depth research. - Highlights: • We develop a taxonomy of fishing communities based on vulnerability indicators. • We validate the community clusters through the use of surveys (“ground-truthing”). • Clusters differ along important aspects of fishing community vulnerability. • Clustering communities allows for accurate and timely social impact assessments.

  9. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  10. Lawrence Livermore National Security CFO Processes Functional Management Assessment

    SciTech Connect (OSTI)

    Sparks, A; Sampson, D; Thomas, B; Mendez, M

    2008-06-12

    The scope of the Functional Management Assessment of the CFO included a review of the CFO Organizational Structure, including deployed financial services and the division of responsibilities and internal controls between CFO and other organizations that perform financial functions across the Laboratory. In addition, the assessment team solicited input from end users and reviewers. Three issues discussed are: ISSUE 1: Financial activities and cash transactions are occurring outside the CFO organization. Approximately $200M of non-purchase order spending occurs in seven areas outside CFO control (travel, relocation, special disbursements, IPO, legal, risk management, and freight). NIF financial services have not been integrated into the CFO organization and operate outside CFO control. Business risks--There is no single point of financial accountably; Currently within the CFO and Business and Operations organizations there is a lack of clarity of roles and responsibilities for financial activities; Financial talent within the laboratory is fragmented; and Inefficiencies exist based on the current structure; An example of the above business risks associated with organizational structure can be observed in the process for reimbursement of relocation costs to employees. Currently, Human Resources and Travel both administer portions of an employee's relocation. Costs are reviewed for compliance with FAR travel guidelines and for compliance with the offer letter but there is no financial review for allowability of costs nor is there a single point where the total relocation costs are reviewed. Through the e-pay system the check is processed by the CFO organization but there is no review by that organization. ISSUE 2: Impact of involuntary separation on current and future activities. 3 risks are: (1) Loss of internal controls--with the upcoming involuntary reductions there will be a loss of personnel with institutional knowledge which will increase the risk of losing

  11. V-125: Cisco Connected Grid Network Management System Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am...

  12. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis...

  13. V-122: IBM Tivoli Application Dependency Discovery Manager Java...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity...

  14. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis ...

  15. Environment, safety and health progress assessment of the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Not Available

    1991-11-01

    This report documents the results of the Environment, Safety, and Health (ES&H) Progress Assessment of the Fernald Environmental Management Project (FEMP), Fernald, Ohio, conducted from October 15 through October 25, 1991. The Secretary of Energy directed that small, focused, ES&H Progress Assessments be performed as part of the continuing effort to institutionalize line management accountability and the self-assessment process in the areas of ES&H. The FEMP assessment is the pilot assessment for this new program. The objectives for the FEMP ES&H Progress Assessment were to assess: (1) how the FEMP has progressed since the 1989 Tiger Assessment; (2) how effectively the FEMP has corrected specific deficiencies and associated root causes identified by that team; and (3) whether the current organization, resources, and systems are sufficient to proactively manage ES&H issues.

  16. Adaptive capacity and its assessment

    SciTech Connect (OSTI)

    Engle, Nathan L.

    2011-04-20

    This paper reviews the concept of adaptive capacity and various approaches to assessing it, particularly with respect to climate variability and change. I find that adaptive capacity is a relatively under-researched topic within the sustainability science and global change communities, particularly since it is uniquely positioned to improve linkages between vulnerability and resilience research. I identify opportunities for advancing the measurement and characterization of adaptive capacity by combining insights from both vulnerability and resilience frameworks, and I suggest several assessment approaches for possible future development that draw from both frameworks and focus on analyzing the governance, institutions, and management that have helped foster adaptive capacity in light of recent climatic events.

  17. Enterprise Assessments Targeted Review of the Safety System Management...

    Energy Savers [EERE]

    Complex (Y-12) Highly Enriched Uranium Materials Facility (HEUMF). Consolidated Nuclear Security, LLC (CNS) is the management and operating contractor for Y-12. This ...

  18. Senior Technical Safety Manager Qualification Program Self-Assessment...

    Energy Savers [EERE]

    In accordance CNS Standard Operating Procedure SOP-016, Senior Technical Safety Manager ... More Documents & Publications 2011 Annual Workforce Analysis and Staffing Plan Report - ...

  19. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  20. Save Energy Now Assessment Helps Expand Energy Management Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    KB) More Documents & Publications Terra Nitrogen Company, L.P.: Ammonia Plant Greatly ... Save Energy Now Assessment Steam System Efficiency Optimized After J.R. Simplot Fertilizer ...

  1. Save Energy Now Assessment Helps Expand Energy Management Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Based on recommendations from their Save Energy Now assessment, Shaw Industries plant 20 ... boiler tubes, Shaw Industries' Dalton plant achieved significant energy savings. * ...

  2. Cost Quality Management Assessment for the Idaho Operations Office. Final report

    SciTech Connect (OSTI)

    1995-06-01

    The Office of Engineering and Cost Management (EM-24) conducted a Cost Quality Management Assessment of EM-30 and EM-40 activities at the Idaho National Engineering Laboratory on Feb. 3--19, 1992 (Round I). The CQMA team assessed the cost and cost-related management activities at INEL. The Round II CQMA, conducted at INEL Sept. 19--29, 1994, reviewed EM-30, EM-40, EM-50, and EM-60 cost and cost-related management practices against performance objectives and criteria. Round II did not address indirect cost analysis. INEL has made measurable progress since Round I.

  3. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  4. Senior Technical Safety Manager Qualification Program Self-Assessment- Chief of Nuclear Safety

    Broader source: Energy.gov [DOE]

    This Chief of Nuclear Safety (CNS) Report was prepared to summarize the results of the July 2013 CNS self-assessment of the Senior Technical Safety Manager Qualification Program.

  5. Fiscal Year 2007 Civilian Radioactive Waste Management Fee Adequacy Assessment Report

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Office of Civilian Radioactive Waste Management Fee Adequacy Assessment Report is to present an analysis of the adequacy of the fee being paid by nuclear power utilities...

  6. Environmental management assessment of the Waste Isolation Pilot Plant (WIPP), Carlsbad, New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-07-01

    This document contains the results of the Environmental Management Assessment of the Waste Isolation Pilot Plant (WIPP). This Assessment was conducted by EH-24 from July 19 through July 30, 1993 to advise the Secretary of Energy of the adequacy of management systems established at WIPP to ensure the protection of the environment and compliance with Federal, state, and DOE environmental requirements. The mission of WIPP is to demonstrate the safe disposal of transuranic (TRU) waste. During this assessment, activities and records were reviewed and interviews were conducted with personnel from the management and operating contractors. This assessment revealed that WIPP`s environmental safety and health programs are satisfactory, and that all levels of the Waste Isolation Division (WID) management and staff consistently exhibit a high level of commitment to achieve environmental excellence.

  7. A framework for the assessment of severe accident management strategies

    SciTech Connect (OSTI)

    Kastenberg, W.E.; Apostolakis, G.; Dhir, V.K.

    1993-09-01

    Severe accident management can be defined as the use of existing and/or altemative resources, systems and actors to prevent or mitigate a core-melt accident. For each accident sequence and each combination of severe accident management strategies, there may be several options available to the operator, and each involves phenomenological and operational considerations regarding uncertainty. Operational uncertainties include operator, system and instrumentation behavior during an accident. A framework based on decision trees and influence diagrams has been developed which incorporates such criteria as feasibility, effectiveness, and adverse effects, for evaluating potential severe accident management strategies. The framework is also capable of propagating both data and model uncertainty. It is applied to several potential strategies including PWR cavity flooding, BWR drywell flooding, PWR depressurization and PWR feed and bleed.

  8. Hanford Site Waste Management Area C Performance Assessment

    Broader source: Energy.gov [DOE]

    Presentation from the 2015 Annual Performance and Risk Assessment (P&RA) Community of Practice (CoP) Technical Exchange Meeting held in Richland, Washington on December 15-16, 2015.

  9. Assessment of public perception of radioactive waste management in Korea.

    SciTech Connect (OSTI)

    Trone, Janis R.; Cho, SeongKyung; Whang, Jooho; Lee, Moo Yul

    2011-11-01

    The essential characteristics of the issue of radioactive waste management can be conceptualized as complex, with a variety of facets and uncertainty. These characteristics tend to cause people to perceive the issue of radioactive waste management as a 'risk'. This study was initiated in response to a desire to understand the perceptions of risk that the Korean public holds towards radioactive waste and the relevant policies and policy-making processes. The study further attempts to identify the factors influencing risk perceptions and the relationships between risk perception and social acceptance.

  10. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  11. Management of the Area 5 Radioactive Waste Management Site using Decision-based, Probabilistic Performance Assessment Modeling

    SciTech Connect (OSTI)

    Carilli, J.; Crowe, B.; Black, P.; Tauxe, J.; Stockton, T.; Catlett, K.; Yucel, V.

    2003-02-27

    Low-level radioactive waste from cleanup activities at the Nevada Test Site and from multiple sites across the U.S. Department of Energy (DOE) complex is disposed at two active Radioactive Waste Management Sites (RWMS) on the Nevada Test Site. These facilities, which are managed by the DOE National Nuclear Security Administration Nevada Site Office, were recently designated as one of two regional disposal centers and yearly volumes of disposed waste now exceed 50,000 m3 (> 2 million ft3). To safely and cost-effectively manage the disposal facilities, the Waste Management Division of Environmental Management has implemented decision-based management practices using flexible and problem-oriented probabilistic performance assessment modeling. Deterministic performance assessments and composite analyses were completed originally for the Area 5 and Area 3 RWMSs located in, respectively, Frenchman Flat and Yucca Flat on the Nevada Test Site. These documents provide the technical bases for issuance of disposal authorization statements for continuing operation of the disposal facilities. Both facilities are now in a maintenance phase that requires testing of conceptual models, reduction of uncertainty, and site monitoring all leading to eventual closure of the facilities and transition to long-term stewardship.

  12. Enterprise Assessments Review of the Pantex Plant Emergency Management

    Energy Savers [EERE]

    Hanford K-West Annex Facility OAR EA-HANFORD-2014-09 thru 2015-06 | Department of Energy for the Review of the Hanford K-West Annex Facility OAR EA-HANFORD-2014-09 thru 2015-06 Enterprise Assessments Operational Awareness Record for the Review of the Hanford K-West Annex Facility OAR EA-HANFORD-2014-09 thru 2015-06 September 2015 Operational Awareness Record for the Review of the Hanford K-West Annex Facility The Department of Energy independent Office of Enterprise Assessments' Office of

  13. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  14. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  15. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  16. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  17. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  18. United States Environmental Protection Agency: Use of risk assessment and risk management methodologies. Master's thesis

    SciTech Connect (OSTI)

    Lamuro, R.J.

    1992-09-30

    Make a full investigation of the policy implications and appropriate uses of risk assessment and risk management in regulatory programs under various Federal laws to prevent cancer and other chronic health effects which may result from exposure to hazardous substances. This is the primary mission of the Risk Assessment and Management Commission (Risk Commission). The Clean Air Act Amendments of 1990 (CAAA), created the Risk Commission reflecting Congress' concern over agency use of risk assessment and risk management techniques and methodologies to implement federal laws protective of human health. The Risk Commission is to consider: methods for measuring and describing risks of chronic health effects from hazardous substances; methods to reflect uncertainties associated with estimation techniques, and whether it is possible or desirable to develop a consistent risk assessment methodology or a consistent standard of acceptable risk for various federal programs.

  19. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  20. Integrating impact assessment and conflict management in urban planning: Experiences from Finland

    SciTech Connect (OSTI)

    Peltonen, Lasse; Sairinen, Rauno

    2010-09-15

    The article examines the interlinkages between recent developments in conflict management and impact assessment procedures in the context of urban planning in Finland. It sets out by introducing the fields of impact assessment and conflict mediation. It then proceeds to discuss the development of impact assessment practices and the status of conflict mediation in Finnish land use planning. The case of Korteniitty infill development plan in Jyvaeskylae is used to demonstrate how the Finnish planning system operates in conflict situations - and how social impact assessment can contribute to managing planning conflicts. The authors ask how the processes of impact assessment contribute to conflict management. Based on the Finnish experience, it is argued that social impact assessment of land use plans can contribute to conflict management, especially in the absence of institutionalised conflict mediation processes. In addition, SIA may acquire features of conflict mediation, depending on extent and intensity of stakeholder participation in the process, and the quality of linkages it between knowledge production and decision-making. Simultaneously, conflict mediation practices and theoretical insights can inform the application of SIA to help it address land use conflicts more consciously.

  1. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  2. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-179: IBM Java 7 Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-094: IBM Multiple Products Multiple...

  3. Natural resource management activities at the Savannah River Site. Environmental Assessment

    SciTech Connect (OSTI)

    Not Available

    1993-07-01

    This environmental assessment (EA) reviews the environmental consequences of ongoing natural resource management activities on the Savannah River Site (SRS). Appendix A contains the Natural Resources Management Plant (NRMP). While several SRS organizations have primary responsibilities for different elements of the plan, the United States Department of Agriculture (USDA), Forest Service, Savannah River Forest Station (SRFS) is responsible for most elements. Of the river scenarios defined in 1985, the High-Intensity Management alternative established the upper bound of environmental consequences; it represents a more intense level of resource management than that being performed under current resource management activities. This alternative established compliance mechanisms for several natural resource-related requirements and maximum practical timber harvesting. Similarly, the Low-Intensity Management alternative established the lower bound of environmental consequences and represents a less intense level of resource management than that being performed under current resource management activities. This alternative also established compliance mechanisms, but defined a passively managed natural area. The Proposed Action of this EA describes the current level of multiple-natural resource management. This EA reviews the proposed action, and the high and low intensity alternative scenarios.

  4. An examination of the role of risk assessment in superfund program management, implementation, and evaluation

    SciTech Connect (OSTI)

    Bala, S.

    1995-12-01

    Human health risk assessment is playing an increasing role in the characterization of the nature and extent of human health threats posed by Superfund hazardous waste sites, and the prioritization of these sites for remediation activities. Risk assessment also plays a central role in initiatives to measure and evaluate the program`s progress in remediating these sites, and in efforts to communicate that progress to a diverse audience. This paper examines the current role of risk assessment in Superfund`s program management, implementation, and evaluation activities, and advocates the need for a comprehensive plan to enhance and systematically apply risk assessment information across all of these activities. Specifically, this paper examines the role of risk assessment at three levels: (1) the current role of risk information in Superfund`s program management activities; (2) the current role of risk information in the implementation of site cleanup; (3) profile of Superfund`s approach to measuring, evaluating, and communicating site remediation progress via Environmental Indicators (EIs). Building on this three-level examination, this paper calls for the development of a comprehensive plan for the enhanced and systematic application of risk assessment information in Superfund`s program management, implementation, and evaluation activities. This paper also draws upon the current literature on risk assessment and measurement, risk-based planning and decision-making, and risk communication.

  5. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department`s plutonium storage. Volume II, Appendix B, Part 9: Oak Ridge site site team report

    SciTech Connect (OSTI)

    1994-09-01

    This report provides the input to and results of the Department of Energy (DOE) - Oak Ridge Operations (ORO) DOE Plutonium Environment, Safety and Health (ES & H) Vulnerability Assessment (VA) self-assessment performed by the Site Assessment Team (SAT) for the Oak Ridge National Laboratory (ORNL or X-10) and the Oak Ridge Y-12 Plant (Y-12) sites that are managed by Martin Marietta Energy Systems, Inc. (MMES). As initiated (March 15, 1994) by the Secretary of Energy, the objective of the VA is to identify and rank-order DOE-ES&H vulnerabilities associated for the purpose of decision making on the interim safe management and ultimate disposition of fissile materials. This assessment is directed at plutonium and other co-located transuranics in various forms.

  6. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment

    SciTech Connect (OSTI)

    Irving, John S

    2003-04-01

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  7. Idaho National Engineering and Environmental Laboratory Wildland Fire Management Environmental Assessment - April 2003

    SciTech Connect (OSTI)

    Irving, J.S.

    2003-04-30

    DOE prepared an environmental assessment (EA)for wildland fire management activities on the Idaho National Engineering and Environmental Laboratory (INEEL) (DOE/EA-1372). The EA was developed to evaluate wildland fire management options for pre-fire, fire suppression, and post fire activities. Those activities have an important role in minimizing the conversion of the native sagebrush steppe ecosystem found on the INEEL to non-native weeds. Four alternative management approaches were analyzed: Alternative 1 - maximum fire protection; Alternative 2 - balanced fire protection; Alternative 2 - balanced fire protection; Alternative 3 - protect infrastructure and personnel; and Alternative 4 - no action/traditional fire protection.

  8. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  9. RCRA Assessment Plan for Single-Shell Tank Waste Management Area A-AX at the Hanford Site

    SciTech Connect (OSTI)

    Narbutovskih, Susan M.; Chou, Charissa J.

    2006-03-03

    This document describes a groundwater assessment plan for the single-shell tank systems in Waste Management Area A-AX at the Hanford Site.

  10. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  11. V-132: IBM Tivoli System Automation Application Manager Multiple

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security

  12. EIS-0220: Interim Management of Nuclear Materials at the Savannah River Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    This environmental impact statement assesses the potential environmental impacts of actions necessary to manage nuclear materials at the Savannah River Site (SRS) in Aiken, South Carolina, until decisions on their ultimate disposition are made and implemented. The Department of Energy has decided to initiate actions which will stabilize certain of the SRS materials that represent environment, safety and health vulnerabilities in their current storage condition or which may represent a vulnerability within the next 10 years.

  13. Assessment and comparison of waste management costs for nuclear and fossil energy sources

    SciTech Connect (OSTI)

    Long, F.G.; Zaccai, H.; Ward, R.D.; McNicholas, P.; Albers, R.W.

    1993-12-31

    This paper presents the key results of an assessment of waste management costs undertaken by a group of international experts on behalf of the IAEA, Vienna. The objective of this work is to provide an assessment and comparison of the impact of waste management on the cost of electricity production from nuclear and other energy sources. The study focuses on the cost of managing wastes arising from the production of electricity from a PWR, with and without reprocessing, a coal-fueled conventional steam cycle, and a gas-fueled combined cycle; using data available in the open literature. This study has only assessed the impact of those waste management costs which are typically internalized by an electric utility and passed on as part of the price charged to customers. The data utilized in the study is typically in range form, reflecting worldwide experience with such factors as technology, regulatory requirements and economic parameters. To the extent that estimates can be identified in the literature the study has attempted to include costs associated with waste management from all stages of the fuel cycles. This paper also includes a discussion of future developments which may influence the results of this work including the effect of technology advances and changes in regulatory requirements.

  14. Risk management & organizational uncertainty implications for the assessment of high consequence organizations

    SciTech Connect (OSTI)

    Bennett, C.T.

    1995-02-23

    Post hoc analyses have demonstrated clearly that macro-system, organizational processes have played important roles in such major catastrophes as Three Mile Island, Bhopal, Exxon Valdez, Chernobyl, and Piper Alpha. How can managers of such high-consequence organizations as nuclear power plants and nuclear explosives handling facilities be sure that similar macro-system processes are not operating in their plants? To date, macro-system effects have not been integrated into risk assessments. Part of the reason for not using macro-system analyses to assess risk may be the impression that standard organizational measurement tools do not provide hard data that can be managed effectively. In this paper, I argue that organizational dimensions, like those in ISO 9000, can be quantified and integrated into standard risk assessments.

  15. Scientific basis for risk assessment and management of uranium mill tailings

    SciTech Connect (OSTI)

    Not Available

    1986-01-01

    A National Research Council study panel, convened by the Board on Radioactive Waste Management, has examined the scientific basis for risk assessment and management of uranium mill tailings and issued this final report containing a number of recommendations. Chapter 1 provides a brief introduction to the problem. Chapter 2 examines the processes of uranium extraction and the mechanisms by which radionuclides and toxic chemicals contained in the ore can enter the environment. Chapter 3 is devoted to a review of the evidence on health risks associated with radon and its decay products. Chapter 4 provides a consideration of conventional and possible new technical alternatives for tailings management. Chapter 5 explores a number of issues of comparative risk, provides a brief history of uranium mill tailings regulation, and concludes with a discussion of choices that must be made in mill tailing risk management. 211 refs., 30 figs., 27 tabs.

  16. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  17. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 85: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT:

  18. LCA-IWM: A decision support tool for sustainability assessment of waste management systems

    SciTech Connect (OSTI)

    Boer, J. den Boer, E. den; Jager, J.

    2007-07-01

    The paper outlines the most significant result of the project 'The use of life cycle assessment tools for the development of integrated waste management strategies for cities and regions with rapid growing economies', which was the development of two decision-support tools: a municipal waste prognostic tool and a waste management system assessment tool. The article focuses on the assessment tool, which supports the adequate decision making in the planning of urban waste management systems by allowing the creation and comparison of different scenarios, considering three basic subsystems: (i) temporary storage; (ii) collection and transport and (iii) treatment, disposal and recycling. The design and analysis options, as well as the assumptions made for each subsystem, are shortly introduced, providing an overview of the applied methodologies and technologies. The sustainability assessment methodology used in the project to support the selection of the most adequate scenario is presented with a brief explanation of the procedures, criteria and indicators applied on the evaluation of each of the three sustainability pillars.

  19. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  20. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  1. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  2. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  3. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  4. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  5. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  6. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  7. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  8. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  9. A multi-criteria decision analysis assessment of waste paper management options

    SciTech Connect (OSTI)

    Hanan, Deirdre; Burnley, Stephen; Cooke, David

    2013-03-15

    Highlights: ► Isolated communities have particular problems in terms of waste management. ► An MCDA tool allowed a group of non-experts to evaluate waste management options. ► The group preferred local waste management solutions to export to the mainland. ► Gasification of paper was the preferred option followed by recycling. ► The group concluded that they could be involved in the decision making process. - Abstract: The use of Multi-criteria Decision Analysis (MCDA) was investigated in an exercise using a panel of local residents and stakeholders to assess the options for managing waste paper on the Isle of Wight. Seven recycling, recovery and disposal options were considered by the panel who evaluated each option against seven environmental, financial and social criteria. The panel preferred options where the waste was managed on the island with gasification and recycling achieving the highest scores. Exporting the waste to the English mainland for incineration or landfill proved to be the least preferred options. This research has demonstrated that MCDA is an effective way of involving community groups in waste management decision making.

  10. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  11. Waste management project's alternatives: A risk-based multi-criteria assessment (RBMCA) approach

    SciTech Connect (OSTI)

    Karmperis, Athanasios C.; Sotirchos, Anastasios; Aravossis, Konstantinos; Tatsiopoulos, Ilias P.

    2012-01-15

    Highlights: Black-Right-Pointing-Pointer We examine the evaluation of a waste management project's alternatives. Black-Right-Pointing-Pointer We present a novel risk-based multi-criteria assessment (RBMCA) approach. Black-Right-Pointing-Pointer In the RBMCA the evaluation criteria are based on the quantitative risk analysis of the project's alternatives. Black-Right-Pointing-Pointer Correlation between the criteria weight values and the decision makers' risk preferences is examined. Black-Right-Pointing-Pointer Preference to the multi-criteria against the one-criterion evaluation process is discussed. - Abstract: This paper examines the evaluation of a waste management project's alternatives through a quantitative risk analysis. Cost benefit analysis is a widely used method, in which the investments are mainly assessed through the calculation of their evaluation indicators, namely benefit/cost (B/C) ratios, as well as the quantification of their financial, technical, environmental and social risks. Herein, a novel approach in the form of risk-based multi-criteria assessment (RBMCA) is introduced, which can be used by decision makers, in order to select the optimum alternative of a waste management project. Specifically, decision makers use multiple criteria, which are based on the cumulative probability distribution functions of the alternatives' B/C ratios. The RBMCA system is used for the evaluation of a waste incineration project's alternatives, where the correlation between the criteria weight values and the decision makers' risk preferences is analyzed and useful conclusions are discussed.

  12. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  13. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 2

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A.

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation.

  14. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 1

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A.

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation. These Appendices contain the Federal Register Notice, comments on evaluation factors, independent technical reviewers resumes, independent technical reviewers manual, and technology information packages.

  15. Environmental assessment of garden waste management in the Municipality of Aarhus, Denmark

    SciTech Connect (OSTI)

    Boldrin, Alessio; Andersen, Jacob K.; Christensen, Thomas H.

    2011-07-15

    An environmental assessment of six scenarios for handling of garden waste in the Municipality of Aarhus (Denmark) was performed from a life cycle perspective by means of the LCA-model EASEWASTE. In the first (baseline) scenario, the current garden waste management system based on windrow composting was assessed, while in the other five scenarios alternative solutions including incineration and home composting of fractions of the garden waste were evaluated. The environmental profile (normalised to Person Equivalent, PE) of the current garden waste management in Aarhus is in the order of -6 to 8 mPE Mg{sup -1} ww for the non-toxic categories and up to 100 mPE Mg{sup -1} ww for the toxic categories. The potential impacts on non-toxic categories are much smaller than what is found for other fractions of municipal solid waste. Incineration (up to 35% of the garden waste) and home composting (up to 18% of the garden waste) seem from an environmental point of view suitable for diverting waste away from the composting facility in order to increase its capacity. In particular the incineration of woody parts of the garden waste improved the environmental profile of the garden waste management significantly.

  16. RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY

    SciTech Connect (OSTI)

    Horton, Duane G.

    2007-03-26

    WMA TX-TY contains underground, single-shell tanks that were used to store liquid waste that contained chemicals and radionuclides. Most of the liquid has been removed, and the remaining waste is regulated under the RCRA as modified in 40 CFR Part 265, Subpart F and Washington States Hazardous Waste Management Act . WMA TX-TY was placed in assessment monitoring in 1993 because of elevated specific conductance. A groundwater quality assessment plan was written in 1993 describing the monitoring activities to be used in deciding whether WMA TX-TY had affected groundwater. That plan was updated in 2001 for continued RCRA groundwater quality assessment as required by 40 CFR 265.93 (d)(7). This document further updates the assessment plan for WMA TX-TY by including (1) information obtained from ten new wells installed at the WMA after 1999 and (2) information from routine quarterly groundwater monitoring during the last five years. Also, this plan describes activities for continuing the groundwater assessment at WMA TX TY.

  17. ROLE OF TOXICITY ASSESSMENT AND MONITORING IN MANAGING THE RECOVERY OF A WASTEWATER RECEIVING STREAM

    SciTech Connect (OSTI)

    Greeley Jr, Mark Stephen; Kszos, Lynn A; Stewart, Arthur J; Smith, John G

    2011-01-01

    We evaluate the roles of a long-term comprehensive toxicity assessment and monitoring program in management and for ecological recovery of a freshwater receiving stream impacted by industrial discharges and legacy contamination. National Pollution Discharge Elimination Permit (NPDES)-driven whole effluent toxicity (WET) tests using Ceriodaphnia and fathead minnows were conducted for more than twenty years to characterize wastewaters at the US National Nuclear Security Agency s Y-12 National Security Complex in Oak Ridge, Tennessee. Ambient toxicity tests also were conducted to assess water samples from EFPC, the stream receiving the wastewater discharges. The ambient tests were conducted as part of an extensive biological monitoring program that included routine surveys of fish, invertebrate and periphyton communities. WET testing, associated toxicant identification evaluations (TIEs), and ambient toxicity monitoring were instrumental in identifying toxicants and their sources at the Y-12 Complex, guiding modifications to wastewater treatment procedures, and assessing the success of various pollution-abatement actions. Through time, as requirements changed and water quality improved, the toxicity monitoring program became more focused. Ambient testing with Ceriodaphnia and fathead minnow larvae also was supplemented with less-standardized but more-sensitive alternative laboratory and in situ bioassays. The Y-12 Complex biological monitoring experience demonstrates the significant roles effluent and ambient toxicity testing can have in controlling and managing toxic discharges to receiving waters. It also emphasizes the value of supplementing WET and standardized ambient toxicity tests with alternative laboratory and in situ toxicity tests tailored to address specific problems.

  18. Result Summary for the Area 5 Radioactive Waste Management Site Performance Assessment Model Version 4.113

    SciTech Connect (OSTI)

    Shott, G. J.

    2012-04-15

    Preliminary results for Version 4.113 of the Nevada National Security Site Area 5 Radioactive Waste Management Site performance assessment model are summarized. Version 4.113 includes the Fiscal Year 2011 inventory estimate.

  19. Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel

    Broader source: Energy.gov [DOE]

    The Assessment of Disposal Options for DOE-Managed High-Level Radioactive Waste and Spent Nuclear Fuel report assesses the technical options for the safe and permanent disposal of high-level radioactive waste (HLW) and spent nuclear fuel (SNF) managed by the Department of Energy. Specifically, it considers whether DOE-managed HLW and SNF should be disposed of with commercial SNF and HLW in one geologic repository or whether there are advantages to developing separate geologic disposal pathways for some DOE-managed HLW and SNF. The report recommends that the Department begin implementation of a phased, adaptive, and consent-based strategy with development of a separate mined repository for some DOE-managed HLW and cooler DOE-managed SNF.

  20. Groundwater contamination. Volume 2: Management, containment, risk assessment and legal issues

    SciTech Connect (OSTI)

    Rail, C.D.

    2000-07-01

    This book explains in a comprehensive way the sources for groundwater contamination, the regulations governing it, and the technologies for abating it. Volume 2 discusses aquifer management, including technologies to control and stabilize multiple influxes into the water table. This volume outlines strategies for stormwater control and groundwater restoration and presents numerous case histories of site analysis and remediation based on DOE and state documents. Among the many new features of this edition are a full discussion of risk assessment, the preparation of groundwater protection plans, and references linking the text to over 2,300 water-related Web sites.

  1. Baseline Risk Assessment Supporting Closure at Waste Management Area C at the Hanford Site Washington

    SciTech Connect (OSTI)

    Singleton, Kristin M.

    2015-01-07

    The Office of River Protection under the U.S. Department of Energy is pursuing closure of the Single-Shell Tank (SST) Waste Management Area (WMA) C under the requirements of the Hanford Federal Facility Agreement and Consent Order (HFFACO). A baseline risk assessment (BRA) of current conditions is based on available characterization data and information collected at WMA C. The baseline risk assessment is being developed as a part of a Resource Conservation and Recovery Act (RCRA) Facility Investigation (RFI)/Corrective Measures Study (CMS) at WMA C that is mandatory under Comprehensive Environmental Response, Compensation, and Liability Act and RCRA corrective action. The RFI/CMS is needed to identify and evaluate the hazardous chemical and radiological contamination in the vadose zone from past releases of waste from WMA C. WMA C will be under Federal ownership and control for the foreseeable future, and managed as an industrial area with restricted access and various institutional controls. The exposure scenarios evaluated under these conditions include Model Toxics Control Act (MTCA) Method C, industrial worker, maintenance and surveillance worker, construction worker, and trespasser scenarios. The BRA evaluates several unrestricted land use scenarios (residential all-pathway, MTCA Method B, and Tribal) to provide additional information for risk management. Analytical results from 13 shallow zone (0 to 15 ft. below ground surface) sampling locations were collected to evaluate human health impacts at WMA C. In addition, soil analytical data were screened against background concentrations and ecological soil screening levels to determine if soil concentrations have the potential to adversely affect ecological receptors. Analytical data from 12 groundwater monitoring wells were evaluated between 2004 and 2013. A screening of groundwater monitoring data against background concentrations and Federal maximum concentration levels was used to determine vadose zone

  2. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  3. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  4. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  5. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  6. US Energy Sector Vulnerabilities to Climate Change

    Broader source: Energy.gov (indexed) [DOE]

    Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND ... and International Affairs (DOE-PI) and the National Renewable Energy Laboratory (NREL). ...

  7. Vulnerability Analysis of Energy Delivery Control Systems

    Broader source: Energy.gov (indexed) [DOE]

    ... Attackers can search for vulnerabilities in firewalls, ... organization, measured in terms of confidentiality, ... in which an adversary can enter the system and potentially ...

  8. Assessment of national systems for obtaining local acceptance of waste management siting and routing activities

    SciTech Connect (OSTI)

    Paige, H.W.; Lipman, D.S.; Owens, J.E.

    1980-07-01

    There is a rich mixture of formal and informal approaches being used in our sister nuclear democracies in their attempts to deal with the difficulties of obtaining local acceptance for siting of waste management facilities and activities. Some of these are meeting with a degree of success not yet achieved in the US. Although this survey documents and assesses many of these approaches, time did not permit addressing in any detail their relevance to common problems in the US. It would appear the US could benefit from a periodic review of the successes and failures of these efforts, including analysis of their applicability to the US system. Of those countries (Germany, Sweden, Switzerland, Japan, Belgium, and the US) who are working to a time table for the preparation of a high-level waste (HLW) repository, Germany is the only country to have gained local siting acceptance for theirs. With this (the most difficult of siting problems) behind them they appear to be in the best overall condition relative to waste management progress and plans. This has been achieved without a particularly favorable political structure, made up for by determination on the part of the political leadership. Of the remaining three countries studied (France, UK and Canada) France, with its AVM production facility, is clearly the world leader in the HLW immobilization aspect of waste management. France, Belgium and the UK appear to have the least favorable political structures and environments for arriving at waste management decisions. US, Switzerland and Canada appear to have the least favorable political structures and environments for arriving at waste management decisions.

  9. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  10. MANAGEMENT OF RESEARCH AND TEST REACTOR ALUMINUM SPENT NUCLEAR FUEL - A TECHNOLOGY ASSESSMENT

    SciTech Connect (OSTI)

    Vinson, D.

    2010-07-11

    The Department of Energy's Environmental Management (DOE-EM) Program is responsible for the receipt and storage of aluminum research reactor spent nuclear fuel or used fuel until ultimate disposition. Aluminum research reactor used fuel is currently being stored or is anticipated to be returned to the U.S. and stored at DOE-EM storage facilities at the Savannah River Site and the Idaho Nuclear Technology and Engineering Center. This paper assesses the technologies and the options for safe transportation/receipt and interim storage of aluminum research reactor spent fuel and reviews the comprehensive strategy for its management. The U.S. Department of Energy uses the Appendix A, Spent Nuclear Fuel Acceptance Criteria, to identify the physical, chemical, and isotopic characteristics of spent nuclear fuel to be returned to the United States under the Foreign Research Reactor Spent Nuclear Fuel Acceptance Program. The fuel is further evaluated for acceptance through assessments of the fuel at the foreign sites that include corrosion damage and handleability. Transport involves use of commercial shipping casks with defined leakage rates that can provide containment of the fuel, some of which are breached. Options for safe storage include wet storage and dry storage. Both options must fully address potential degradation of the aluminum during the storage period. This paper focuses on the various options for safe transport and storage with respect to technology maturity and application.

  11. Management assessment of tank waste remediation system contractor readiness to proceed with phase 1B privatization

    SciTech Connect (OSTI)

    Honeyman, J.O.

    1998-01-09

    This Management Assessment of Tank Waste Remediation System (TWRS) Contractor Readiness to Proceed With Phase 1B Privatization documents the processes used to determine readiness to proceed with tank waste treatment technologies from private industry, now known as TWRS privatization. An overall systems approach was applied to develop action plans to support the retrieval and disposal mission of the TWRS Project. The systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed to ensure they exist when needed. Since October 1996 a robust system engineering approach to establishing integrated Technical Baselines, work breakdown structures, tank farms organizational structure and configurations, work scope, and costs has become part of the culture within the TWRS Project. An analysis of the programmatic, management, and technical activities necessary to declare readiness to proceed with execution of the mission demonstrates that the system, personnel, and hardware will be on-line and ready to support the private contractors. The systems approach included defining the retrieval and disposal mission requirements and evaluating the readiness of the Project Hanford Management Contract (PHMC) team to support initiation of waste processing by the private contractors in June 2002 and to receive immobilized waste shortly thereafter. The Phase 1 feed delivery requirements from the private contractor Requests for Proposal were reviewed. Transfer piping routes were mapped, existing systems were evaluated, and upgrade requirements were defined.

  12. Joint Assessment of Renewable Energy and Water Desalination Research Center (REWDC) Program Capabilities and Facilities In Radioactive Waste Management

    SciTech Connect (OSTI)

    Bissani, M; Fischer, R; Kidd, S; Merrigan, J

    2006-04-03

    The primary goal of this visit was to perform a joint assessment of the Renewable Energy and Water Desalination Center's (REWDC) program in radioactive waste management. The visit represented the fourth technical and scientific interaction with Libya under the DOE/NNSA Sister Laboratory Arrangement. Specific topics addressed during the visit focused on Action Sheet P-05-5, ''Radioactive Waste Management''. The Team, comprised of Mo Bissani (Team Lead), Robert Fischer, Scott Kidd, and Jim Merrigan, consulted with REWDC management and staff. The team collected information, discussed particulars of the technical collaboration and toured the Tajura facility. The tour included the waste treatment facility, waste storage/disposal facility, research reactor facility, hot cells and analytical labs. The assessment team conducted the first phase of Task A for Action Sheet 5, which involved a joint assessment of the Radioactive Waste Management Program. The assessment included review of the facilities dedicated to the management of radioactive waste at the Tourja site, the waste management practices, proposed projects for the facility and potential impacts on waste generation and management.

  13. Assessment and management of aquatic impacts from airport de-icing activities -- The Canadian perspective

    SciTech Connect (OSTI)

    Kent, R.A.; Andersen, D.; Simpson, A.

    1995-12-31

    Historically, aircraft deicing fluids have simply drained from aircraft and runway surfaces into airport drainage systems and invariably end up in surrounding receiving aquatic systems. This led to recent concerns over environmental impacts from glycol-based fluids typically used for deicing aircraft. Glycols from de-icing fluids have been detected at high levels at Canadian airports. Concern not only stems from the high volumes being used at relatively few point sources, but also to the higher toxicity of the formulated de-icing fluids, compared to pure glycols. As a result, significant environmental management efforts have been made at Canadian airports over the last 4 years, including extensive stormwater monitoring, glycol mitigation and pollution prevention plans. Site-specific mitigation plans have been implemented at 15 major Canadian airports which typically include glycol containment, collection and removal. While a reasonable dataset is available on the toxicity of pure glycols, much less information is available on the toxicity of formulated deicers. Furthermore, there have been very few field assessments of the aquatic impacts of de-icing. To date, management regimes developed to address the problem in Canada have focused almost exclusively on glycols and voluntary compliance to discharge limits and receiving water quality guidelines. This approach has resulted in reductions in the quantities of glycols which are released from Canadian airports into the surrounding environment. Currently, government and industry are refining this management system with an examination of new approaches and options such as more holistic airport wastewater quality assessments and toxicity-based guidelines.

  14. Hawaii demand-side management resource assessment. Final report: DSM opportunity report

    SciTech Connect (OSTI)

    1995-08-01

    The Hawaii Demand-Side Management Resource Assessment was the fourth of seven projects in the Hawaii Energy Strategy (HES) program. HES was designed by the Department of Business, Economic Development, and Tourism (DBEDT) to produce an integrated energy strategy for the State of Hawaii. The purpose of Project 4 was to develop a comprehensive assessment of Hawaii`s demand-side management (DSM) resources. To meet this objective, the project was divided into two phases. The first phase included development of a DSM technology database and the identification of Hawaii commercial building characteristics through on-site audits. These Phase 1 products were then used in Phase 2 to identify expected energy impacts from DSM measures in typical residential and commercial buildings in Hawaii. The building energy simulation model DOE-2.1E was utilized to identify the DSM energy impacts. More detailed information on the typical buildings and the DOE-2.1E modeling effort is available in Reference Volume 1, ``Building Prototype Analysis``. In addition to the DOE-2.1E analysis, estimates of residential and commercial sector gas and electric DSM potential for the four counties of Honolulu, Hawaii, Maui, and Kauai through 2014 were forecasted by the new DBEDT DSM Assessment Model. Results from DBEDTs energy forecasting model, ENERGY 2020, were linked with results from DOE-2.1E building energy simulation runs and estimates of DSM measure impacts, costs, lifetime, and anticipated market penetration rates in the DBEDT DSM Model. Through its algorithms, estimates of DSM potential for each forecast year were developed. Using the load shape information from the DOE-2.1E simulation runs, estimates of electric peak demand impacts were developed. 10 figs., 55 tabs.

  15. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  16. Management Challenges in Developing Performance Assessments and Effectively Communicating Their Results - 13612

    SciTech Connect (OSTI)

    Thomas, Steve; Mahoney, Mark

    2013-07-01

    The end of the Cold War has left a legacy of approximately 37 million gallons of radioactive waste in the aging waste tanks at the Department of Energy's Savannah River Site (SRS). A robust program is in place to remove waste from these tanks, treat the waste to separate into a relatively small volume of high level waste and a large volume of low-level waste, and to actively dispose of the low-level waste on-site and close the cleaned waste tanks and associated ancillary structures. To support performance-based, risk-informed decision making, performance assessments have been developed for the low-level waste disposal facility and for the SRS Tank Farms. Although these performance assessments share many similar features, the nature of the hazards and associated containments differ. As a management team, we are challenged to effectively communicate both the similarities and differences of these performance assessments, how they should be used to support sound decision making for treatment, disposal and waste tank cleaning decisions, and in defending their respective assumptions to the regulatory community and the public but, equally important, to our own corporate decision makers and operations personnel. Effective development and defense of these performance assessments, and effective interpretation and communication of the results are key to making cost-effective, pragmatic decisions for the safe disposal of the low-level waste and stabilization and operational closure of the cleaned tanks and associated structures. This paper will focus on the importance and challenges in communicating key attributes, conclusions and operational implications within a company. (authors)

  17. Radioactive Waste Management Complex low-level waste radiological performance assessment

    SciTech Connect (OSTI)

    Maheras, S.J.; Rood, A.S.; Magnuson, S.O.; Sussman, M.E.; Bhatt, R.N.

    1994-04-01

    This report documents the projected radiological dose impacts associated with the disposal of radioactive low-level waste at the Radioactive Waste Management Complex at the Idaho National Engineering Laboratory. This radiological performance assessment was conducted to evaluate compliance with applicable radiological criteria of the US Department of Energy and the US Environmental Protection Agency for protection of the public and the environment. The calculations involved modeling the transport of radionuclides from buried waste, to surface soil and subsurface media, and eventually to members of the public via air, groundwater, and food chain pathways. Projections of doses were made for both offsite receptors and individuals inadvertently intruding onto the site after closure. In addition, uncertainty and sensitivity analyses were performed. The results of the analyses indicate compliance with established radiological criteria and provide reasonable assurance that public health and safety will be protected.

  18. Assessment of medical waste management at a primary health-care center in Sao Paulo, Brazil

    SciTech Connect (OSTI)

    Moreira, A.M.M.; Guenther, W.M.R.

    2013-01-15

    Highlights: Black-Right-Pointing-Pointer Assessment of medical waste management at health-care center before/after intervention. Black-Right-Pointing-Pointer Qualitative and quantitative results of medical waste management plan are presented. Black-Right-Pointing-Pointer Adjustments to comply with regulation were adopted and reduction of waste was observed. Black-Right-Pointing-Pointer The method applied could be useful for similar establishments. - Abstract: According to the Brazilian law, implementation of a Medical Waste Management Plan (MWMP) in health-care units is mandatory, but as far as we know evaluation of such implementation has not taken place yet. The purpose of the present study is to evaluate the improvements deriving from the implementation of a MWMP in a Primary Health-care Center (PHC) located in the city of Sao Paulo, Brazil. The method proposed for evaluation compares the first situation prevailing at this PHC with the situation 1 year after implementation of the MWMP, thus allowing verification of the evolution of the PHC performance. For prior and post-diagnosis, the method was based on: (1) application of a tool (check list) which considered all legal requirements in force; (2) quantification of solid waste subdivided into three categories: infectious waste and sharp devices, recyclable materials and non-recyclable waste; and (3) identification of non-conformity practices. Lack of knowledge on the pertinent legislation by health workers has contributed to non-conformity instances. The legal requirements in force in Brazil today gave origin to a tool (check list) which was utilized in the management of medical waste at the health-care unit studied. This tool resulted into an adequate and simple instrument, required a low investment, allowed collecting data to feed indicators and also conquered the participation of the unit whole staff. Several non-conformities identified in the first diagnosis could be corrected by the instrument utilized

  19. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  20. Dose assessment for management alternatives for NORM-contaminated equipment within the petroleum industry

    SciTech Connect (OSTI)

    Blunt, D.L.; Smith, K.P.

    1995-08-01

    The contamination of drilling and production equipment by naturally occurring radioactive material (NORM) is a growing concern for the petroleum industry and regulators. Large volumes of NORM-contaminated scrap metal are generated by the industry each year. The contamination generally occurs as surface contamination on the interior of water-handling equipment. The source of this contamination is accumulation of by-product wastes, in the form of scale and sludge contaminated with NORM that are generated by extraction processes. The primary radionuclides of concern in petroleum industry NORM-wastes are radium-226 (Ra-226), and radium-228 (Ra-228). These isotopes are members of the uranium-238 and thorium-232 decay series, respectively. The uranium and thorium isotopes, which are naturally present in the subsurface formations from which hydrocarbons are extracted, are largely immobile and remain in the subsurface. The more soluble radium can become mobilized in the formation water and be transported to the surface in the produced water waste stream. The radium either remains in solution or precipitates in scale or sludge deposits, depending on water salinity and on temperature and pressure phase changes. NORM-containing scale consists of radium that has coprecipitated with barium, calcium, or strontium sulfates, and sludge typically consists of radium-containing silicates and carbonates. This assessment is limited to the evaluation of potential radiological doses from management options that specifically involve recycle and reuse of contaminated metal. Doses from disposal of contaminated equipment are not addressed. Radiological doses were estimated for workers and the general public for equipment decontamination and smelting. Results of this assessment can be used to examine policy issues concerning the regulation and management of NORM-contaminated wastes generated by the petroleum industry.

  1. Pollution prevention opportunity assessment for the SNL/California waste management facilities

    SciTech Connect (OSTI)

    Braye, S.; Phillips, N.M.

    1995-01-01

    SNL/California`s waste management facilities, Bldgs. 961 and 962-2, generate a secondary stream of hazardous and radioactive waste. This waste stream is generated mainly during the processing and handling of hazardous, radioactive, and mixed wastes (primary waste stream), which are generated by the laboratories, and when cleaning up spills. The secondary waste stream begins with the removal of a generator`s hazardous, radioactive, and mixed waste from specified collection areas. The waste stream ends when the containers of processed waste are loaded for shipment off-site. The total amount of secondary hazardous waste generated in the waste management facilities from January 1993 to July 1994 was 1,160.6 kg. The total amount of secondary radioactive waste generated during the same period was 1,528.8 kg (with an activity of 0.070 mCi). Mixed waste usually is not generated in the secondary waste stream. This pollution prevention opportunity assessment (PPOA) was conducted using the graded approach methodology developed by the Department of Energy (DOE) PPOA task group. The original method was modified to accommodate the needs of Sandia`s site-specific processes. The options generated for potential hazardous waste minimization, cost savings, and environmental health and safety were the result of a waste minimization team effort. The results of the team efforts are summarized.

  2. Assessment of thermal analysis software for the DOE Office of Civilian Radioactive Waste Management

    SciTech Connect (OSTI)

    Williams, P.T.; Graham, R.F.; Lagerberg, G.N.; Chung, T.C.

    1989-07-01

    This assessment uses several recent assessments and the more general code compilations that have been completed to produce a list of 116 codes that can be used for thermal analysis. This list is then compared with criteria prepared especially for the Department of Energy Office of Civilian Radioactive Waste Management (DOE/OCRWM). Based on these criteria, fifteen codes are narrowed to three primary codes and four secondary codes for use by the OCRWM thermal analyst. The analyst is cautioned that since no single code is sufficient for all applications, a code must be selected based upon the predominate heat transfer mode of the problem to be solved, but the codes suggested in this report have been used successfully for a range of OCRWM applications. The report concludes with a series of recommendations for additional work of which the major points include the following: The codes suggested by this report must be benchmarked with the existing US and international problems and validated when possible; An interactive code selection tool could be developed or, perhaps even more useful, a users group could be supported to ensure the proper selection of thermal codes and dissemination of information on the latest version; The status of the 116 codes identified by this report should be verified, and methods for maintaining the still active codes must be established; and special capabilities of each code in phase change, convection and radiation should be improved to better enable the thermal analyst to model OCRWM applications. 37 refs., 3 figs., 12 tabs.

  3. Preliminary Performance Assessment for the Waste Management Area C at the Hanford Site in Southeast Washington

    SciTech Connect (OSTI)

    Bergeron, Marcel P.; Singleton, Kristin M.; Eberlein, Susan J.

    2015-01-07

    A performance assessment (PA) of Single-Shell Tank (SST) Waste Management Area C (WMA C) located at the U.S. Department of Energy's (DOE) Hanford Site in southeastern Washington is being conducted to satisfy the requirements of the Hanford Federal Facility Agreement and Consent Order (HFFACO), as well as other Federal requirements and State-approved closure plans and permits. The WMP C PA assesses the fate, transport, and impacts of radionuclides and hazardous chemicals within residual wastes left in tanks and ancillary equipment and facilities in their assumed closed configuration and the subsequent risks to humans into the far future. The part of the PA focused on radiological impacts is being developed to meet the requirements for a closure authorization under DOE Order 435.1 that includes a waste incidental to reprocessing determination for residual wastes remaining in tanks, ancillary equipment, and facilities. An additional part of the PA will evaluate human health and environmental impacts from hazardous chemical inventories in residual wastes remaining in WMA C tanks, ancillary equipment, and facilities needed to meet the requirements for permitted closure under RCRA.

  4. One size fits all? An assessment tool for solid waste management at local and national levels

    SciTech Connect (OSTI)

    Broitman, Dani; Ayalon, Ofira; Kan, Iddo

    2012-10-15

    Highlights: Black-Right-Pointing-Pointer Waste management schemes are generally implemented at national or regional level. Black-Right-Pointing-Pointer Local conditions characteristics and constraints are often neglected. Black-Right-Pointing-Pointer We developed an economic model able to compare multi-level waste management options. Black-Right-Pointing-Pointer A detailed test case with real economic data and a best-fit scenario is described. Black-Right-Pointing-Pointer Most efficient schemes combine clear National directives with local level flexibility. - Abstract: As environmental awareness rises, integrated solid waste management (WM) schemes are increasingly being implemented all over the world. The different WM schemes usually address issues such as landfilling restrictions (mainly due to methane emissions and competing land use), packaging directives and compulsory recycling goals. These schemes are, in general, designed at a national or regional level, whereas local conditions and constraints are sometimes neglected. When national WM top-down policies, in addition to setting goals, also dictate the methods by which they are to be achieved, local authorities lose their freedom to optimize their operational WM schemes according to their specific characteristics. There are a myriad of implementation options at the local level, and by carrying out a bottom-up approach the overall national WM system will be optimal on economic and environmental scales. This paper presents a model for optimizing waste strategies at a local level and evaluates this effect at a national level. This is achieved by using a waste assessment model which enables us to compare both the economic viability of several WM options at the local (single municipal authority) level, and aggregated results for regional or national levels. A test case based on various WM approaches in Israel (several implementations of mixed and separated waste) shows that local characteristics significantly

  5. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  6. V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java ...

  7. Utilizing Semantic Big Data for realizing a National-scale Infrastructure Vulnerability Analysis System

    SciTech Connect (OSTI)

    Chinthavali, Supriya; Shankar, Mallikarjun

    2016-01-01

    Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph, (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.

  8. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  9. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  10. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  11. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  12. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  13. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  14. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  15. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Energy Savers [EERE]

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  16. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  17. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  18. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  19. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  20. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  1. WM2014 Conference- Building the Community of Practice for Performance and Risk Assessment in Support of Risk-Informed Environmental Management Decisions

    Broader source: Energy.gov [DOE]

    WM2014 Conference - Building the Community of Practice for Performance and Risk Assessment in Support of Risk-Informed Environmental Management Decisions - 14575

  2. Performance Assessment Transport Modeling of Uranium at the Area 5 Radioactive Waste Management Site at the Nevada National Security Site

    SciTech Connect (OSTI)

    NSTec Radioactive Waste

    2010-10-12

    Following is a brief summary of the assumptions that are pertinent to the radioactive isotope transport in the GoldSim Performance Assessment model of the Area 5 Radioactive Waste Management Site, with special emphasis on the water-phase reactive transport of uranium, which includes depleted uranium products.

  3. RCRA Assessment Plan for Single-Shell Tank Waste Management Area TX-TY at the Hanford Site

    SciTech Connect (OSTI)

    Hodges, Floyd N.; Chou, Charissa J.

    2001-02-23

    A groundwater quality assessment plan was prepared to investigate the rate and extent of aquifer contamination beneath Waste Management Area TX-TY on the Hanford Site in Washington State. This plan is an update of a draft plan issued in February 1999, which guided work performed in fiscal year 2000.

  4. Environmental assessment for the Radioactive and Mixed Waste Management Facility: Sandia National Laboratories/New Mexico

    SciTech Connect (OSTI)

    Not Available

    1993-06-01

    The Department of Energy (DOE) has prepared an environmental assessment (EA) (DOE/EA-0466) under the National Environmental Policy Act (NEPA) of 1969 for the proposed completion of construction and subsequent operation of a central Radioactive and Mixed Waste Management Facility (RMWMF), in the southeastern portion of Technical Area III at Sandia National Laboratory, Albuquerque (SNLA). The RMWMF is designed to receive, store, characterize, conduct limited bench-scale treatment of, repackage, and certify low-level waste (LLW) and mixed waste (MW) (as necessary) for shipment to an offsite disposal or treatment facility. The RMWMF was partially constructed in 1989. Due to changing regulatory requirements, planned facility upgrades would be undertaken as part of the proposed action. These upgrades would include paving of road surfaces and work areas, installation of pumping equipment and lines for surface impoundment, and design and construction of air locks and truck decontamination and water treatment systems. The proposed action also includes an adjacent corrosive and reactive metals storage area, and associated roads and paving. LLW and MW generated at SNLA would be transported from the technical areas to the RMWMF in containers approved by the Department of Transportation. The RMWMF would not handle nonradioactive hazardous waste. Based on the analysis in the EA, the proposed completion of construction and operation of the RMWMF does not constitute a major Federal action significantly affecting the quality of the human environment within the meaning of NEPA. Therefore, preparation of an environmental impact statement for the proposed action is not required.

  5. Pilot study risk assessment for selected problems at the Fernald Environmental Management Project (FEMP)

    SciTech Connect (OSTI)

    Hamilton, L.D.; Meinhold, A.F.; Baxter, S.L.; Holtzman, S.; Morris, S.C.; Pardi, R.; Rowe, M.D.; Sun, C.; Anspaugh, L.; Layton, D.

    1993-03-01

    Two important environmental problems at the USDOE Fernald Environmental Management Project (FEMP) facility in Fernald, Ohio were studied in this human health risk assessment. The problems studied were radon emissions from the K-65 waste silos, and offsite contamination of ground water with uranium. Waste from the processing of pitchblende ore is stored in the K-65 silos at the FEMP. Radium-226 in the waste decays to radon gas which escapes to the outside atmosphere. The concern is for an increase in lung cancer risk for nearby residents associated with radon exposure. Monitoring data and a gaussian plume transport model were used to develop a source term and predict exposure and risk to fenceline residents, residents within 1 and 5 miles of the silos, and residents of Hamilton and Cincinnati, Ohio. Two release scenarios were studied: the routine release of radon from the silos and an accidental loss of one silo dome integrity. Exposure parameters and risk factors were described as distributions. Risks associated with natural background radon concentrations were also estimated.

  6. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  7. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  8. Burlington Bottoms Wildlife Mitigation Project. Final Environmental Assessment/Management Plan and Finding of No Significant Impact.

    SciTech Connect (OSTI)

    Not Available

    1994-12-01

    Bonneville Power Administration (BPA) proposes to fund wildlife management and enhancement activities for the Burlington bottoms wetlands mitigation site. Acquired by BPA in 1991, wildlife habitat at Burlington bottoms would contribute toward the goal of mitigation for wildlife losses and inundation of wildlife habitat due to the construction of Federal dams in the lower Columbia and Willamette River Basins. Target wildlife species identified for mitigation purposes are yellow warbler, great blue heron, black-capped chickadee, red-tailed hawk, valley quail, spotted sandpiper, wood duck, and beaver. The Draft Management Plan/Environmental Assessment (EA) describes alternatives for managing the Burlington Bottoms area, and evaluates the potential environmental impacts of the alternatives. Included in the Draft Management Plan/EA is an implementation schedule, and a monitoring and evaluation program, both of which are subject to further review pending determination of final ownership of the Burlington Bottoms property.

  9. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  10. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.