National Library of Energy BETA

Sample records for mv lighting security

  1. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  2. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  3. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema (OSTI)

    Philips, Julia [Sandia

    2010-01-08

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  4. Lighting the night one step at a time | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Controls Lighting Controls Use lighting controls to automatically turn lights on and off as needed, and save energy. Use lighting controls to automatically turn lights on and off as needed, and save energy. Use lighting controls to automatically turn lights on and off as needed, and save energy. Of course you can save energy by turning off lights when they're not needed, but sometimes we forget or don't notice that we've left them on. The most common types of lighting controls include: Dimmers

  5. Observation of 690 MV m^-1 Electron Accelerating Gradient with...

    Office of Scientific and Technical Information (OSTI)

    Observation of 690 MV m-1 Electron Accelerating Gradient with a Laser-Driven Dielectric Microstructure Citation Details In-Document Search Title: Observation of 690 MV m-1...

  6. M&V Guidelines: Measurement and Verification for Federal Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0) M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0) ...

  7. M&V Guidelines: Measurement and Verification for Federal Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    M&V Guidelines: Measurement and Verification for Performance-Based Contracts Version 4.0 ... Management Program November 2015 FEMP M&V Guidelines 4.0 i ACKNOWLEDGMENTS ...

  8. M&V Guidelines: Measurement and Verification for Performance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    You are here Home M&V Guidelines: Measurement and Verification for Performance-Based Contracts (Version 4.0) M&V Guidelines: Measurement and Verification for Performance-Based ...

  9. Lighting

    Broader source: Energy.gov [DOE]

    One of the simplest ways to save energy and money is to switch to energy-efficient lights. Learn about your lighting choices that can save you money.

  10. FEMP Seeking Public Comment on Draft M&V Guidelines

    Broader source: Energy.gov [DOE]

    FEMP is continuing its request for public comments on the Draft M&V Guidelines: Measurement and Verification for Performance-Based Contracts (Version 4.0).

  11. M&V Guidelines: Measurement and Verification for Federal Energy...

    Energy Savers [EERE]

    and Verification Protocol (IPMVP) Concepts and Options for Determining Energy and Water Savings Volume 1, April 2007. M&V Guidelines 3.0 FEMP ii Contents Section Page Section...

  12. Assessment of Automated Measurement and Verification (M&V) Methods

    SciTech Connect (OSTI)

    Granderson, Jessica; Touzani, Samir; Custodio, Claudine; Sohn, Michael; Fernandes, Samuel; Jump, David

    2015-07-01

    This report documents the application of a general statistical methodology to assess the accuracy of baseline energy models, focusing on its application to Measurement and Verification (M&V) of whole-building energy savings.

  13. State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V)

    Office of Energy Efficiency and Renewable Energy (EERE)

    State and Local Energy Savings Performance Contracting: Savings Measurement and Verification (M&V) Webinar.

  14. COMMISSIONING AND OPERATION OF THE CEBAF 100 MV CRYOMODULES

    SciTech Connect (OSTI)

    Allison, Trent; Davis, G; Drury, Michael; Harwood, Leigh; Hogan, John; Kimber, Andrew; Lahti, George; Merz, William; Nelson, Richard; Plawski, Tomasz; Seidman, David; Spata, Michael; Wilson, Michael

    2012-07-01

    The Continuous Electron Beam Accelerator Facility (CEBAF) energy upgrade from 6 GeV to 12 GeV includes the installation of ten new 100 MV cryomodules and RF systems. The superconducting RF cavities are designed to operate CW at a maximum accelerating gradient of 19.3 MV/m. To support the higher gradients and higher Q{sub L} ({approx} 3 x 10{sup 7}), a new RF system has been developed and is being installed to power and control the cavities. The RF system employs digital control and 13 kW klystrons. Recently, two of these cryomodules and associated RF hardware and software have been installed and commissioned in the CEBAF accelerator. Electrons at linac currents up to 540 {micro}A have been successfully accelerated and used for nuclear physics experiments. This paper reports on the commissioning and operation of the RF system and cryomodules.

  15. Standard Measurement & Verification Plan for Lighting Equipment Retrofit or Replacement Projects

    SciTech Connect (OSTI)

    Richman, Eric E.

    2009-11-04

    This document provides a framework for a standard Measurement and Verification (M&V) plan for lighting projects. It was developed to support cost-effective retrofits (partial and complete replacements) of lighting systems and is intended to provide a foundation for an M&V plan for a lighting retrofit utilizing a "best practice" approach, and to provide guidance to site owners, contractors, and other involved organizations on what is essential for a robust M&V plan for lighting projects. This document provides examples of appropriate elements of an M&V plan, including the calculation of expected energy savings. The standard M&V plan, as provided, also allows for consistent comparison with other similar lighting projects. Although intended for lighting retrofit applications, M&V plans developed per this framework document may also be used for other non-lighting technology retrofits and new installations.

  16. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  17. M&V Guidelines: Measurement and Verification for Federal Energy Projects

    Broader source: Energy.gov [DOE]

    FEMP's standard procedures and guidelines for M&V for federal energy managers, procurement officials, and energy service providers.

  18. Measurement and Verification (M&V) Guidelines for Federal Energy Projects, V3.0

    SciTech Connect (OSTI)

    2008-06-11

    FEMP's standard procedures and guidelines for M&V for federal energy managers, procurement officials, and energy service providers.

  19. Standard Measurement and Verification Plan for Lighting Retrofit Projects for Buildings and Building Sites

    SciTech Connect (OSTI)

    Richman, Eric E.

    2012-10-31

    This document provides a framework for standard measurement and verification (M&V) of lighting retrofit and replacement projects. It was developed to provide site owners, contractors, and other involved organizations with the essential elements of a robust M&V plan for lighting projects. It includes details on all aspects of effectively measuring light levels of existing and post-retrofit projects, conducting power measurement, and developing cost-effectiveness analysis. This framework M&V plan also enables consistent comparison among similar lighting projects, and may be used to develop M&V plans for non--lighting-technology retrofits and new installations.

  20. SU-E-T-221: Investigation of Lower Energy (< 6 MV) Photon Beams for Cancer Radiotherapy

    SciTech Connect (OSTI)

    Zhang, Y; Ming, X; Feng, Y; Zhou, L; Ahmad, M; Deng, J; Nguyen, K; Griffin, M

    2014-06-01

    Purpose: To study the potential applications of the lower energy (< 6MV) photon beams in the radiotherapeutic management of pediatric cancer and lung cancer patients. Methods: Photon beams of 2, 3, 4, 5 and 6MV were first simulated with EGS4/BEAM and then used for Monte-Carlo dose calculations. For four pediatric patients with abdominal and brain lesions, six 3D-conformal radiotherapy (3DCRT) plans were generated using single photon energy (2 to 6MV) or mixed energies (3 and 6MV). Furthermore, a virtual machine of 3 and 6MV was commissioned in a treatment planning system (TPS) based on Monte-Carlo simulated data. Three IMRT plans of a lung cancer patient were generated on this virtual machine. All plans were normalized to D95% of target dose for 6MV plan and then compared in terms of integral dose and OAR sparing. Results: For the four pediatric patients, the integral dose for the 2, 3, 4 and 5MV plans increased by 9%, 5%, 3.5%, 1.7%, respectively as compared to 6MV. Almost all OARs in the 2MV plan received more than 10% more doses than 6MV. Mixed energy 3DCRT plans were of the same quality as 6MV plans. For the lung IMRT plans, both the 3MV plan and the mixed beam plan showed better OAR sparing in comparison to 6MV plan. Specifically, the maximum and mean doses to the spinal cord in the mixed energy plan were lower by 21% and 16%, respectively. Conclusion: Single lower energy photon beam was found to be inferior to 6MV in the radiotherapy of pediatric patients and lung cancer patients when the integral doses and the doses to the OARs were considered. However, mixed energy plans combining low with high energy beams showed significant OAR sparing while maintaining the same PTV coverage. Investigation with more patient data is ongoing for further confirmation.

  1. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  2. M&V Guidelines: Measurement and Verification for Federal Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... measured (e.g., reduced solar gain and heat loss through ... The power draw on lighting, plug load, HVAC equipment, and ... controls, exterior photocells, and improved programmed ...

  3. Secure computing for the 'Everyman'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure computing for the 'Everyman' Secure computing for the 'Everyman' If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. September 2, 2014 This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information

  4. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  5. M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0)

    Broader source: Energy.gov [DOE]

    Document outlines the Federal Energy Management Program's standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  6. M&V Guidelines: Measurement and Verification for Performance-Based Contracts Version 4.0

    SciTech Connect (OSTI)

    2015-11-02

    Document outlines the Federal Energy Management Program's standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  7. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  8. Measurement and Verification of Energy Savings and Performance from Advanced Lighting Controls

    Broader source: Energy.gov [DOE]

    This document provides a framework for measurement and verification (M&V) of energy savings, performance, and user satisfaction from lighting retrofit projects involving occupancy-sensor-based, daylighting, and/or other types of automatic lighting. It was developed to provide site owners, contractors, and other involved organizations with the essential elements of a robust M&V plan for retrofit projects and to assist in developing specific project M&V plans.

  9. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  10. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  11. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  12. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  13. Low-Z linac targets for low-MV gold nanoparticle radiation therapy

    SciTech Connect (OSTI)

    Tsiamas, P.; Mishra, P.; Berbeco, R. I.; Marcus, K.; Zygmanski, P. E-mail: Erno-Sajo@uml.edu; Cifter, F.; Sajo, E. E-mail: Erno-Sajo@uml.edu

    2014-02-15

    Purpose: To investigate the potential of low-Z/low-MV (low-Z) linac targets for gold nanoparticle radiotherapy (GNPT) and to determine the microscopic dose enhancement ratio (DER) due to GNP for the alternative beamlines. In addition, to evaluate the degradation of dose enhancement arising from the increased attenuation of x rays and larger skin dose in water for the low-MV beams compared to the standard linac. Methods: Monte Carlo simulations were used to compute dose and DER for various flattening-filter-free beams (2.5, 4, 6.5 MV). Target materials were beryllium, diamond, and tungsten-copper high-Z target. Target thicknesses were selected based on 20%, 60%, 70%, and 80% of the continuous slowing down approximation electron ranges for a given target material and energy. Evaluation of the microscopic DER was carried out for 100 nm GNP including the degradation factors due to beam attenuation. Results: The greatest increase in DER compared to the standard 6.5 MV linac was for a 2.5 MV Be-target (factor of ?2). Skin dose ranged from ?10% (Be, 6.5 MV-80%) to ?85% (Be, 2.5 MV-20%) depending on the target case. Attenuation of 2.5 MV beams at 22 cm was higher by ?75% compared with the standard beam. Taking into account the attenuation at 22 cm depth, the effective dose enhancement was up to ?60% above the DER of the high-Z target. For these cases the effective DER ranged between ?1.6 and 6 compared with the standard linac. Conclusions: Low-Z (2.5 MV) GNPT is possible even after accounting for greater beam attenuation for deep-seated tumors (22 cm) and the increased skin dose. Further, it can lead to significant sparing of normal tissue while simultaneously escalating the dose in the tumor cells.

  14. Construction of MV-6 Well Pad at the Central Nevada Test Area Completed

    Office of Energy Efficiency and Renewable Energy (EERE)

    A new groundwater monitoring/validation (MV) well was installed at the Central Nevada Test Area (CNTA) in September 2013. LM proposed this well to the Nevada Division of Environmental Protection ...

  15. Draft M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 4.0)

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal, state, and local government energy managers and procurement officials and utility and energy service providers.

  16. M&V Guidelines: Measurement and Verification for Federal Energy Projects (Version 3.0)

    Broader source: Energy.gov [DOE]

    Document describes the Federal Energy Management Program's (FEMP) standard procedures and guidelines for measurement and verification (M&V) for federal energy managers, procurement officials, and energy service providers.

  17. Measurement and verifiction (M&V) guidelines for federal energy projects

    SciTech Connect (OSTI)

    1996-02-01

    This document provides procedures and guidelines for quantifying the savings resulting from the installation of Energy Conservation Measures (ECMs) implemented with federal Energy Savings Performance Contracts (ESPCs) or task orders implemented under a federal IDIQ contract. The first section of this document provides an overview of measurement and verification (M&V) options and procedures. The second, third, and fourth sections provide standardized measurement and verification (M&V) methods for common types of ECMs.

  18. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  19. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  20. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  1. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  2. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  4. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  6. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory

    2014-08-31

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  8. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  9. Generation of virtual monochromatic CBCT from dual kV/MV beam projections

    SciTech Connect (OSTI)

    Li, Hao; Liu, Bo; Yin, Fang-Fang

    2013-12-15

    Purpose: To develop a novel on-board imaging technique which allows generation of virtual monochromatic (VM) cone-beam CT (CBCT) with a selected energy from combined kilovoltage (kV)/megavoltage (MV) beam projections. Methods: With the current orthogonal kV/MV imaging hardware equipped in modern linear accelerators, both MV projections (from gantry angle of 0°–100°) and kV projections (90°–200°) were acquired as gantry rotated a total of 110°. A selected range of overlap projections between 90° to 100° were then decomposed into two material projections using experimentally determined parameters from orthogonally stacked aluminum and acrylic step-wedges. Given attenuation coefficients of aluminum and acrylic at a predetermined energy, one set of VM projections could be synthesized from two corresponding sets of decomposed projections. Two linear functions were generated using projection information at overlap angles to convert kV and MV projections at nonoverlap angles to approximate VM projections for CBCT reconstruction. The contrast-to-noise ratios (CNRs) were calculated for different inserts in VM CBCTs of a CatPhan phantom with various selected energies and compared with those in kV and MV CBCTs. The effect of overlap projection number on CNR was evaluated. Additionally, the effect of beam orientation was studied by scanning the CatPhan sandwiched with two 5 cm solid-water phantoms on both lateral sides and an electronic density phantom with two metal bolt inserts. Results: Proper selection of VM energy [30 and 40 keV for low-density polyethylene (LDPE), polymethylpentene, 2 MeV for Delrin] provided comparable or even better CNR results as compared with kV or MV CBCT. An increased number of overlap kV and MV projection demonstrated only marginal improvements of CNR for different inserts (with the exception of LDPE) and therefore one projection overlap was found to be sufficient for the CatPhan study. It was also evident that the optimal CBCT image

  10. Hyaluronan synthase 3 (HAS3) overexpression downregulates MV3 melanoma cell proliferation, migration and adhesion

    SciTech Connect (OSTI)

    Takabe, Piia; Bart, Geneviève; Ropponen, Antti; Rilla, Kirsi; Tammi, Markku; Tammi, Raija; Pasonen-Seppänen, Sanna

    2015-09-10

    Malignant skin melanoma is one of the most deadly human cancers. Extracellular matrix (ECM) influences the growth of malignant tumors by modulating tumor cells adhesion and migration. Hyaluronan is an essential component of the ECM, and its amount is altered in many tumors, suggesting an important role for hyaluronan in tumorigenesis. Nonetheless its role in melanomagenesis is not understood. In this study we produced a MV3 melanoma cell line with inducible expression of the hyaluronan synthase 3 (HAS3) and studied its effect on the behavior of the melanoma cells. HAS3 overexpression expanded the cell surface hyaluronan coat and decreased melanoma cell adhesion, migration and proliferation by cell cycle arrest at G1/G0. Melanoma cell migration was restored by removal of cell surface hyaluronan by Streptomyces hyaluronidase and by receptor blocking with hyaluronan oligosaccharides, while the effect on cell proliferation was receptor independent. Overexpression of HAS3 decreased ERK1/2 phosphorylation suggesting that inhibition of MAP-kinase signaling was responsible for these suppressive effects on the malignant phenotype of MV3 melanoma cells. - Highlights: • Inducible HAS3-MV3 melanoma cell line was generated using Lentiviral transduction. • HAS3 overexpression inhibits MV3 cell migration via hyaluronan–receptor interaction. • HAS3 overexpression decreases MV3 melanoma cell proliferation and adhesion. • ERK1/2 phosphorylation is downregulated by 50% in HAS3 overexpressing cells. • The results suggest that hyaluronan has anti-cancer like effects in melanoma.

  11. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  12. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  14. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  15. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  16. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  17. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  19. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  20. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  5. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  6. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  7. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  8. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  9. Real-time automatic fiducial marker tracking in low contrast cine-MV images

    SciTech Connect (OSTI)

    Lin, Wei-Yang; Lin, Shu-Fang; Yang, Sheng-Chang; Liou, Shu-Cheng; Nath, Ravinder; Liu Wu

    2013-01-15

    Purpose: To develop a real-time automatic method for tracking implanted radiographic markers in low-contrast cine-MV patient images used in image-guided radiation therapy (IGRT). Methods: Intrafraction motion tracking using radiotherapy beam-line MV images have gained some attention recently in IGRT because no additional imaging dose is introduced. However, MV images have much lower contrast than kV images, therefore a robust and automatic algorithm for marker detection in MV images is a prerequisite. Previous marker detection methods are all based on template matching or its derivatives. Template matching needs to match object shape that changes significantly for different implantation and projection angle. While these methods require a large number of templates to cover various situations, they are often forced to use a smaller number of templates to reduce the computation load because their methods all require exhaustive search in the region of interest. The authors solve this problem by synergetic use of modern but well-tested computer vision and artificial intelligence techniques; specifically the authors detect implanted markers utilizing discriminant analysis for initialization and use mean-shift feature space analysis for sequential tracking. This novel approach avoids exhaustive search by exploiting the temporal correlation between consecutive frames and makes it possible to perform more sophisticated detection at the beginning to improve the accuracy, followed by ultrafast sequential tracking after the initialization. The method was evaluated and validated using 1149 cine-MV images from two prostate IGRT patients and compared with manual marker detection results from six researchers. The average of the manual detection results is considered as the ground truth for comparisons. Results: The average root-mean-square errors of our real-time automatic tracking method from the ground truth are 1.9 and 2.1 pixels for the two patients (0.26 mm/pixel). The

  10. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  11. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  16. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  17. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  18. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  19. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  20. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  1. Na onal Security Site?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mul ple Choice (circle the correct answer) 1. How many diff erent animal species can be found at the Nevada Na onal Security Site? a. Less than 500 b. Exactly 1,325 c. More than 1,500 d. Exactly 2,303 2. Nuclear research, development and tes ng caused radioac ve contamina on of: a. Buildings b. Clothes and tools c. Soil and water d. All of the above 3. One method used to check soil for the presence of radioac ve contamina on is: a. Use a black light to see if the soil glows b. Send soil samples

  2. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  3. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  7. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  8. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  9. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  10. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  11. (Lighting and) Solid-State Lighting: Science, Technology, Economic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Perspectives Lighting and) Solid-State Lighting: Science, Technology, Economic Perspectives - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  13. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  14. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  15. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  16. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  17. Metal artifact correction for x-ray computed tomography using kV and selective MV imaging

    SciTech Connect (OSTI)

    Wu, Meng; Keil, Andreas; Constantin, Dragos; Star-Lack, Josh; Zhu, Lei; Fahrig, Rebecca

    2014-12-15

    Purpose: The overall goal of this work is to improve the computed tomography (CT) image quality for patients with metal implants or fillings by completing the missing kilovoltage (kV) projection data with selectively acquired megavoltage (MV) data that do not suffer from photon starvation. When both of these imaging systems, which are available on current radiotherapy devices, are used, metal streak artifacts are avoided, and the soft-tissue contrast is restored, even for regions in which the kV data cannot contribute any information. Methods: Three image-reconstruction methods, including two filtered back-projection (FBP)-based analytic methods and one iterative method, for combining kV and MV projection data from the two on-board imaging systems of a radiotherapy device are presented in this work. The analytic reconstruction methods modify the MV data based on the information in the projection or image domains and then patch the data onto the kV projections for a FBP reconstruction. In the iterative reconstruction, the authors used dual-energy (DE) penalized weighted least-squares (PWLS) methods to simultaneously combine the kV/MV data and perform the reconstruction. Results: The authors compared kV/MV reconstructions to kV-only reconstructions using a dental phantom with fillings and a hip-implant numerical phantom. Simulation results indicated that dual-energy sinogram patch FBP and the modified dual-energy PWLS method can successfully suppress metal streak artifacts and restore information lost due to photon starvation in the kV projections. The root-mean-square errors of soft-tissue patterns obtained using combined kV/MV data are 10–15 Hounsfield units smaller than those of the kV-only images, and the structural similarity index measure also indicates a 5%–10% improvement in the image quality. The added dose from the MV scan is much less than the dose from the kV scan if a high efficiency MV detector is assumed. Conclusions: The authors have shown that it

  18. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  19. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  20. Fiducial marker and marker-less soft-tissue detection using fast MV fluoroscopy on a new generation EPID: Investigating the influence of pulsing artifacts and artifact suppression techniques

    SciTech Connect (OSTI)

    Poels, Kenneth Verellen, Dirk; Van de Vondel, Iwein; El Mazghari, Rafik; De Ridder, Mark; Depuydt, Tom

    2014-10-15

    Purpose: Because frame rates on current clinical available electronic portal imaging devices (EPIDs) are limited to 7.5 Hz, a new commercially available PerkinElmer EPID (XRD 1642 AP19) with a maximum frame rate of 30 Hz and a new scintillator (Kyokko PI200) with improved sensitivity (light output) for megavolt (MV) irradiation was evaluated. In this work, the influence of MV pulse artifacts and pulsing artifact suppression techniques on fiducial marker and marker-less detection of a lung lesion was investigated, because target localization is an important component of uncertainty in geometrical verification of real-time tumor tracking. Methods: Visicoil markers with a diameter of 0.05 and 0.075 cm were used for MV marker tracking with a frame rate of, respectively, 7.5, 15, and 30 Hz. A 30 Hz readout of the detector was obtained by a 2 2 pixel binning, reducing spatial resolution. Static marker detection was conducted in function of increasing phantom thickness. Additionally, marker-less tracking was conducted and compared with the ground-truth fiducial marker motion. Performance of MV target detection was investigated by comparing the least-square sine wave fit of the detected marker positions with the predefined sine wave motion. For fiducial marker detection, a Laplacian-of-Gaussian enhancement was applied after which normalized cross correlation was used to find the most probable marker position. Marker-less detection was performed by using the scale and orientation adaptive mean shift tracking algorithm. For each MV fluoroscopy, a free running (FR-nF) (ignoring MV pulsing during readout) acquisition mode was compared with two acquisition modes intending to reduce MV pulsing artifacts, i.e., combined wavelet-FFT filtering (FR-wF) and electronic readout synchronized with respect to MV pulses. Results: A 0.05 cm Visicoil marker resulted in an unacceptable root-mean square error (RMSE) > 0.2 cm with a maximum frame rate of 30 Hz during FR-nF readout. With a

  1. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  2. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  3. Secure computing for the 'Everyman' goes to market

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure computing for the 'Everyman' goes to market Secure computing for the 'Everyman' goes to market Quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer December 22, 2014 Secure computing for the 'Everyman' goes to market This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can

  4. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  5. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  6. vehicles | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    vehicles Bay Area national labs team to tackle long-standing automotive hydrogen storage challenge Sandia National Laboratories chemist Mark Allendorf, shown here at Berkeley Lab's Advanced Light Source facility, is leading the Hydrogen Materials - Advanced Research Consortium (HyMARC) to advance solid-state materials for onboard hydrogen storage. Sandia National Laboratories will lead a new tri... Nevada National Security Site operator recognized for green fleet The management and operating

  7. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  8. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  9. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  10. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  11. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  12. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  13. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  14. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  15. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  20. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  1. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  2. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  3. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  4. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  5. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  6. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  7. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  8. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  9. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  10. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  11. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  12. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  13. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  14. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  15. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  16. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  17. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  18. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  19. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  20. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  1. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  2. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  3. Frequently Asked Questions: Lighting Choices to Save You Money | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Frequently Asked Questions: Lighting Choices to Save You Money Frequently Asked Questions: Lighting Choices to Save You Money Frequently Asked Questions: Lighting Choices to Save You Money Below are some of the most frequently asked questions and answers about the new lighting efficiency standards. Learn more about your lighting choices and find out how to shop for lights by lumens, not watts. Why are my lighting choices changing? What is the Energy Independence and Security Act of

  4. Theoretical investigation of the design and performance of a dual energy (kV and MV) radiotherapy imager

    SciTech Connect (OSTI)

    Liu, Langechuan; Antonuk, Larry E. El-Mohri, Youcef; Zhao, Qihua; Jiang, Hao

    2015-04-15

    Purpose: In modern radiotherapy treatment rooms, megavoltage (MV) portal imaging and kilovoltage (kV) cone-beam CT (CBCT) imaging are performed using various active matrix flat-panel imager (AMFPI) designs. To expand the clinical utility of MV and kV imaging, MV AMFPIs incorporating thick, segmented scintillators and, separately, kV imaging using a beams eye view geometry have been investigated by a number of groups. Motivated by these previous studies, it is of interest to explore to what extent it is possible to preserve the benefits of kV and MV imaging using a single AMFPI design, given the considerably different x ray energy spectra used for kV and MV imaging. In this paper, considerations for the design of such a dual energy imager are explored through examination of the performance of a variety of hypothetical AMFPIs based on x ray converters employing segmented scintillators. Methods: Contrast, noise, and contrast-to-noise ratio performances were characterized through simulation modeling of CBCT imaging, while modulation transfer function, Swank factor, and signal performance were characterized through simulation modeling of planar imaging. The simulations were based on a previously reported hybrid modeling technique (accounting for both radiation and optical effects), augmented through modeling of electronic additive noise. All designs employed BGO scintillator material with thicknesses ranging from 0.25 to 4 cm and element-to-element pitches ranging from 0.508 to 1.016 mm. A series of studies were performed under both kV and MV imaging conditions to determine the most advantageous imager configuration (involving front or rear x ray illumination and use of a mirror or black reflector), converter design (pitch and thickness), and operating mode (pitch-binning combination). Results: Under the assumptions of the present study, the most advantageous imager design was found to employ rear illumination of the converter in combination with a black reflector

  5. Commercial Lighting

    Broader source: Energy.gov [DOE]

    Commercial lighting accounts for more than 20 percent of total commercial building energy use. The Energy Department works to reduce lighting energy use through research and deployment.

  6. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  7. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  8. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  9. Brief History of Artificial Lighting Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Artificial Lighting Technology - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  10. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  11. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  12. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  13. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  14. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  15. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  16. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  17. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  18. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  19. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  20. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  1. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  2. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  3. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  4. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  5. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  6. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  7. Tracking tumor boundary in MV-EPID images without implanted markers: A feasibility study

    SciTech Connect (OSTI)

    Zhang, Xiaoyong Homma, Noriyasu; Ichiji, Kei; Takai, Yoshihiro; Yoshizawa, Makoto

    2015-05-15

    Purpose: To develop a markerless tracking algorithm to track the tumor boundary in megavoltage (MV)-electronic portal imaging device (EPID) images for image-guided radiation therapy. Methods: A level set method (LSM)-based algorithm is developed to track tumor boundary in EPID image sequences. Given an EPID image sequence, an initial curve is manually specified in the first frame. Driven by a region-scalable energy fitting function, the initial curve automatically evolves toward the tumor boundary and stops on the desired boundary while the energy function reaches its minimum. For the subsequent frames, the tracking algorithm updates the initial curve by using the tracking result in the previous frame and reuses the LSM to detect the tumor boundary in the subsequent frame so that the tracking processing can be continued without user intervention. The tracking algorithm is tested on three image datasets, including a 4-D phantom EPID image sequence, four digitally deformable phantom image sequences with different noise levels, and four clinical EPID image sequences acquired in lung cancer treatment. The tracking accuracy is evaluated based on two metrics: centroid localization error (CLE) and volume overlap index (VOI) between the tracking result and the ground truth. Results: For the 4-D phantom image sequence, the CLE is 0.23 0.20 mm, and VOI is 95.6% 0.2%. For the digital phantom image sequences, the total CLE and VOI are 0.11 0.08 mm and 96.7% 0.7%, respectively. In addition, for the clinical EPID image sequences, the proposed algorithm achieves 0.32 0.77 mm in the CLE and 72.1% 5.5% in the VOI. These results demonstrate the effectiveness of the authors proposed method both in tumor localization and boundary tracking in EPID images. In addition, compared with two existing tracking algorithms, the proposed method achieves a higher accuracy in tumor localization. Conclusions: In this paper, the authors presented a feasibility study of tracking tumor

  8. First Demonstration of Combined kV/MV Image-Guided Real-Time Dynamic Multileaf-Collimator Target Tracking

    SciTech Connect (OSTI)

    Cho, Byungchul Poulsen, Per R.; Sloutsky, Alex; Sawant, Amit; Keall, Paul J.

    2009-07-01

    Purpose: For intrafraction motion management, a real-time tracking system was developed by combining fiducial marker-based tracking via simultaneous kilovoltage (kV) and megavoltage (MV) imaging and a dynamic multileaf collimator (DMLC) beam-tracking system. Methods and Materials: The integrated tracking system employed a Varian Trilogy system equipped with kV/MV imaging systems and a Millennium 120-leaf MLC. A gold marker in elliptical motion (2-cm superior-inferior, 1-cm left-right, 10 cycles/min) was simultaneously imaged by the kV and MV imagers at 6.7 Hz and segmented in real time. With these two-dimensional projections, the tracking software triangulated the three-dimensional marker position and repositioned the MLC leaves to follow the motion. Phantom studies were performed to evaluate time delay from image acquisition to MLC adjustment, tracking error, and dosimetric impact of target motion with and without tracking. Results: The time delay of the integrated tracking system was {approx}450 ms. The tracking error using a prediction algorithm was 0.9 {+-} 0.5 mm for the elliptical motion. The dose distribution with tracking showed better target coverage and less dose to surrounding region over no tracking. The failure rate of the gamma test (3%/3-mm criteria) was 22.5% without tracking but was reduced to 0.2% with tracking. Conclusion: For the first time, a complete tracking system combining kV/MV image-guided target tracking and DMLC beam tracking was demonstrated. The average geometric error was less than 1 mm, and the dosimetric error was negligible. This system is a promising method for intrafraction motion management.

  9. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  10. Design of a 7-MV Linear Transformer Driver (LTD) for down-hole flash x-ray radiography.

    SciTech Connect (OSTI)

    Cordova, Steve Ray; Welch, Dale Robert; Oliver, Bryan Velten; Rose, David Vincent; Johnson, David Lee; Bruner, Nichelle Lee; Leckbee, Joshua J.

    2008-09-01

    Pulsed power driven flash x-ray radiography is a valuable diagnostic for subcritical experiments at the Nevada Test Site. The existing dual-axis Cygnus system produces images using a 2.25 MV electron beam diode to produce intense x-rays from a small source. Future hydrodynamic experiments will likely use objects with higher areal mass, requiring increased x-ray dose and higher voltages while maintaining small source spot size. A linear transformer driver (LTD) is a compact pulsed power technology with applications ranging from pulsed power flash x-ray radiography to high current Z-pinch accelerators. This report describes the design of a 7-MV dual-axis system that occupies the same lab space as the Cygnus accelerators. The work builds on a design proposed in a previous report [1]. This new design provides increased diode voltage from a lower impedance accelerator to improve coupling to low impedance diodes such as the self magnetic pinch (SMP) diode. The design also improves the predicted reliability by operating at a lower charge voltage and removing components that have proven vulnerable to failure. Simulations of the new design and experimental results of the 1-MV prototype are presented.

  11. Performance and Applications of the first HVE 5MV Tandetron{sup TM} at the University of Madrid

    SciTech Connect (OSTI)

    Mous, D.J.W.; Gottdang, A.; Haitsma, R.G.; Garcia Lopez, G.; Climent-Font, A.; Agullo-Lopez, F.; Boerma, D.O.

    2003-08-26

    The first HVE Tandetron{sup TM} with a nominal terminal voltage of 5 MV has been put into operation at the Universidad Autonoma de Madrid (Spain) as part of their new IBA facility. The accelerator features a coaxial structure in which the all-solid-state power supply is constructed around the high-energy acceleration tube, thereby avoiding the T-shaped tank that has characterized the HVE Tandetrons{sup TM} so far. The new IBA facility covers a number of different ion beam analysis techniques including ERD using heavy-element time-of-flight, RBS, as well as an external micro-beam for PIXE. During installation, tests have shown a stable terminal voltage of 5.5 MV. The terminal voltage ripple was deduced to be below 6 x 10-6 (RMS) for terminal voltages above 800 kV. Terminal voltage undershoot was measured to be 1.4 x 10-3 for a {approx}1 kW beam at 3 MV and recovered to 1 x 10-4 within 800 ms. IBA experiments that require low energy hydrogen beams are supported by a stable terminal voltage down to 100 kV.

  12. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  13. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  14. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  15. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  16. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  17. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  18. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  19. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  20. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  2. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  3. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  4. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  5. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  7. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  8. Provision of mobile and man-portable radiation detection equipment;
  9. Regional cooperation on safeguards...

  10. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  11. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  12. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  14. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  15. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  16. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  17. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  18. Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Light Source Data and Analysis Framework at NERSC Jack Deslippe, Shane Canon, Eli Dart, Abdelilah Essiari, Alexander Hexemer, Dula Parkinson, Simon Patton, Craig Tull + Many More The ALS Data Needs September 21, 2010 - NIST (MD) Light source data volumes are growing many times faster than Moore's law. ● Light source luminosity ● Detector resolution & rep-rates ● Sample automation BES user facilities serve 10,000 scientists and engineers every year. Mostly composed of many small

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  21. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  22. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  1. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  3. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  4. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  5. Lighting Renovations

    Broader source: Energy.gov [DOE]

    When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

  6. Cerenkov Light

    SciTech Connect (OSTI)

    Slifer, Karl

    2013-06-13

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  7. Cerenkov Light

    ScienceCinema (OSTI)

    Slifer, Karl

    2014-05-22

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  8. Residential Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Events Expand News & Events Skip navigation links Residential Residential Lighting Energy Star Appliances Consumer Electronics Heat Pump Water Heaters Electric Storage Water...

  9. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  10. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  11. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  12. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  13. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  14. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  15. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  16. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  17. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  18. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  19. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  20. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  1. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  2. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  3. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  4. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  5. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  6. Mapping the genome of meta-generalized gradient approximation density functionals: The search for B97M-V

    SciTech Connect (OSTI)

    Mardirossian, Narbe; Head-Gordon, Martin

    2015-02-21

    A meta-generalized gradient approximation density functional paired with the VV10 nonlocal correlation functional is presented. The functional form is selected from more than 10{sup 10} choices carved out of a functional space of almost 10{sup 40} possibilities. Raw data come from training a vast number of candidate functional forms on a comprehensive training set of 1095 data points and testing the resulting fits on a comprehensive primary test set of 1153 data points. Functional forms are ranked based on their ability to reproduce the data in both the training and primary test sets with minimum empiricism, and filtered based on a set of physical constraints and an often-overlooked condition of satisfactory numerical precision with medium-sized integration grids. The resulting optimal functional form has 4 linear exchange parameters, 4 linear same-spin correlation parameters, and 4 linear opposite-spin correlation parameters, for a total of 12 fitted parameters. The final density functional, B97M-V, is further assessed on a secondary test set of 212 data points, applied to several large systems including the coronene dimer and water clusters, tested for the accurate prediction of intramolecular and intermolecular geometries, verified to have a readily attainable basis set limit, and checked for grid sensitivity. Compared to existing density functionals, B97M-V is remarkably accurate for non-bonded interactions and very satisfactory for thermochemical quantities such as atomization energies, but inherits the demonstrable limitations of existing local density functionals for barrier heights.

  7. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  8. Voluntary Protection Program Onsite Review, National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  9. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers [EERE]

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  10. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  11. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  12. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  13. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  14. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  15. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  16. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  17. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  18. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  19. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  20. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  1. Security Cases | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    raised concerns about the individual's eligibility to maintain a security clearance. ... and (l), the individual's security clearance was suspended, and he requested a hearing. ...

  2. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  3. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  4. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  5. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  6. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  7. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  8. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  9. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  10. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  13. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  14. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  16. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  17. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  18. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  19. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  20. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  2. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  3. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  4. Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    companies get boost from Los Alamos National Security November 19, 2012 Venture Acceleration Fund awards help region's businesses grow LOS ALAMOS, New Mexico, November 19, 2012- Two local biotech start ups, a water and power company and a hardware inventor are the latest recipients of $165,000 in Venture Acceleration Fund (VAF) awards from Los Alamos National Security, LLC. Mustomo, Inc., IX Power, Synfolia, and Tape-Ease will receive funding to take their products and services to the next

  5. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    200 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 7, 2010 Employee volunteer efforts to be recognized LOS ALAMOS, New Mexico, June 7, 2010-Nonprofit organizations are receiving more than $117,000 from Los Alamos National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits as a result of the volunteer efforts of Los Alamos National

  6. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  7. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  8. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  9. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  10. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  11. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Office of Secure Transportation The Office of Secure Transportation (OST) is managed by the National Nuclear Security Administration within the U. S. Department of Energy. OST is responsible for the safe and secure transport in the contiguous United States of government-owned special nuclear materials. These classified shipments can contain nuclear weapons or components, enriched uranium, or plutonium. The cargo is transported in highly modified secure tractor-trailers and escorted

  12. nevada national security site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nevada national security site NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T

  13. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  14. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  15. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  16. Aberration corrected 1.2-MV cold field-emission transmission electron microscope with a sub-50-pm resolution

    SciTech Connect (OSTI)

    Akashi, Tetsuya; Takahashi, Yoshio; Tanigaki, Toshiaki Shimakura, Tomokazu; Kawasaki, Takeshi; Furutsu, Tadao; Shinada, Hiroyuki; Osakabe, Nobuyuki; Mller, Heiko; Haider, Maximilian; Tonomura, Akira

    2015-02-16

    Atomic-resolution electromagnetic field observation is critical to the development of advanced materials and to the unveiling of their fundamental physics. For this purpose, a spherical-aberration corrected 1.2-MV cold field-emission transmission electron microscope has been developed. The microscope has the following superior properties: stabilized accelerating voltage, minimized electrical and mechanical fluctuation, and coherent electron emission. These properties have enabled to obtain 43-pm information transfer. On the bases of these performances, a 43-pm resolution has been obtained by correcting lens aberrations up to the third order. Observations of GaN [411] thin crystal showed a projected atomic locations with a separation of 44?pm.

  17. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  18. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  19. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  20. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  1. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  2. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  3. Headquarters Security Quick Reference Book

    Office of Energy Efficiency and Renewable Energy (EERE)

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  4. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  5. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    & III-4) ......9 * Classified Information Security Noncompliance ... * Additional Guidance Unique to Classified Information Security Enforcement ...

  6. Commercial Lighting and LED Lighting Incentives | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Schools Institutional Savings Category Lighting Lighting ControlsSensors Other EE LED Lighting Maximum Rebate Up to 100% of cost; incentives that exceed 5,000 should be...

  7. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  8. Biological and Chemical Security

    SciTech Connect (OSTI)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  9. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  10. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  11. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified

  12. Italy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Italy NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of

  13. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  14. Light's Darkness

    ScienceCinema (OSTI)

    Padgett, Miles [University of Glasgow, Glasgow, Scotland

    2010-01-08

    Optical vortices and orbital angular momentum are currently topical subjects in the optics literature. Although seemingly esoteric, they are, in fact, the generic state of light and arise whenever three or more plane waves interfere. To be observed by eye the light must be monochromatic. Laser speckle is one such example, where the optical energy circulates around each black spot, giving a local orbital angular momentum. This talk with report three on-going studies. First, when considering a volume of interfering waves, the laser specs map out threads of complete darkness embedded in the light. Do these threads form loops? Links? Or even knots? Second, when looking through a rapidly spinning window, the image of the world on the other side is rotated: true or false? Finally, the entanglement of orbital angular momentum states means measuring how the angular position of one photons sets the angular momentum of another: is this an angular version of the EPR (Einstein, Podolsky, and Rosen) paradox?

  15. Secure content objects

    DOE Patents [OSTI]

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  16. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  17. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  18. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  19. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land - Surrounded by 4,500 square

  20. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  1. Light-Material Interactions in Energy Conversion - Energy Frontier Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Reactor Technologies » Light Water Reactor Sustainability (LWRS) Program Light Water Reactor Sustainability (LWRS) Program Light Water Reactor Sustainability (LWRS) Program The Light Water Reactor Sustainability (LWRS) Program is developing the scientific basis to extend existing nuclear power plant operating life beyond the current 60-year licensing period and ensure long-term reliability, productivity, safety, and security. The program is conducted in collaboration with national

  2. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  3. solid state lighting | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solid-State Lighting Solid-State Lighting (SSL) is an emerging technology with the potential to address the urgent challenges of revitalizing America's economy, strengthening our national energy security, and reducing our country's greenhouse gas emissions. SSL will mean greener homes and businesses that use substantially less electricity, making them less dependent on fossil fuels. In the coming decade, SSL will become a key to affordable high-performance buildings - buildings that consume less

  4. Y-12 lights the night | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    on the importance of finding cures for and providing access to treatments for blood cancer patients. Y-12's team is striving to meet its 20,000 goal, making the 10-year total...

  5. National Lighting Energy Consumption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lighting Energy National Lighting Energy Consumption Consumption 390 Billion kWh used for lighting in all 390 Billion kWh used for lighting in all commercial buildings in commercial buildings in 2001 2001 LED (<.1% ) Incandescent 40% HID 22% Fluorescent 38% Lighting Energy Consumption by Lighting Energy Consumption by Breakdown of Lighting Energy Breakdown of Lighting Energy Major Sector and Light Source Type Major Sector and Light Source Type Source: Navigant Consulting, Inc., U.S. Lighting

  6. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  8. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  9. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  10. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  11. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  14. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  16. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  17. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 0930...

  18. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  19. Nuclear Security 101 | National Nuclear Security Administration | (NNSA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security 101 March 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material, technology and expertise or radioactive material. Successful nuclear security relies on the integration of technology, policy, operational concepts and international collaboration to prevent acts of nuclear terrorism. The Basics of Nuclear Security include: Removing or Eliminating Highly Enriched Uranium (HEU) and

  20. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site August 23, 2010 The primary mission of the National Nuclear Security Administration (NNSA) is to maintain the safety, security and effectiveness of the nation's nuclear deterrent through surveillance programs and life extension campaigns. Exercising the skills and capabilities required to accomplish that mission provide the nation with a unique capability to support a wide variety of additional national security missions. To maximize this potential, NNSA

  1. Security for Radioactive Sources: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  2. Light Show

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    9 Lightning - Nature's Light Show Lightning provides one of nature's most spectacular displays of energy. Though fascinating to observe, lightning can be dangerous and deadly. Protecting ARM instruments from lightning damage is vital. Putting equipment worth millions of dollars into open fields (Photo: NOAA) ARM Facilities Newsletter is published by Argonne National Laboratory, a multiprogram laboratory operated by The University of Chicago under contract W-31-109-Eng-38 with the U.S. Department

  3. Front lighted optical tooling method and apparatus

    DOE Patents [OSTI]

    Stone, W.J.

    1983-06-30

    An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument.

  4. Y-12 National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Campus Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  5. Secure key storage and distribution

    SciTech Connect (OSTI)

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  6. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tools Security Minutes New! SIMP Late Reporting Social Media Email Association Official Use Only (OUO) Majordomo Email List Risks Email Vacating Spaces Reporting Monitors Review and Approval Top of page

  7. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  8. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    References: PERSEC F 5633.33, NNSA Personnel Security Clearance Action Request DOE F ... All SNL Members of the Worksforce granted a DOE Security Clearance are required to obtain ...

  9. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This order cancels DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011, Physical ...

  10. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  11. Asian Energy Security

    SciTech Connect (OSTI)

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  12. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  13. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  14. Technical Security Program - DOE Directives, Delegations, and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  15. Independent Oversight Review, Nevada National Security - May...

    Office of Environmental Management (EM)

    National Security - May 2013 Independent Oversight Review, Nevada National Security - May 2013 May 2013 Review of the Nevada National Security Site Criticality Safety Program ...

  16. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland Security NNSANFO Language Options U.S. DOENNSA - Nevada Field Office Homeland Security The U.S. Department of Energy (DOE) National Nuclear Security Administration ...

  17. Waste Isolation Pilot Plant Transportation Security | Department...

    Office of Environmental Management (EM)

    Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security (2.41 MB) More Documents & Publications Enterprise ...

  18. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  19. April 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

  20. accountability | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    accountability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  1. transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  2. apm | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    apm NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Contract Award Provides Best

  3. nnss | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nnss NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Contract Award Provides Best

  4. LEU | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    LEU NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... DOE/NNSA Successfully Establishes Uranium Lease and Takeback Program to Support Critical Medical Isotope Production In January 2016,

  5. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD NNSA program strengthens national security from afar The Nuclear Smuggling Detection and Deterrence (NSDD) program is a key component of NNSA's core mission to reduce nuclear threats. The program, part of NNSA's Office of Defense Nuclear Nonproliferation, provides partners tools and training to deter, detect, and investigate smuggling of... NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security

  6. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset

  7. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    gms NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  8. ors | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ors NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  9. David Telles wins NNSA Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David Telles wins NNSA Security Professional of the Year award May 7, 2009 LOS ALAMOS, New Mexico, May 7, 2009 - David M. Telles, who leads Los Alamos National Laboratory's Vulnerability Analysis Office, received a 2008 National Nuclear Security Administration Security Professional of the Year award. NNSA administrator Tom D'Agostino said, "Our security professionals dedicate themselves to protecting some of the nation's most vital strategic assets, and in so doing, help advance broader

  10. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  11. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  12. contracts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management, Organizational and Administrative Support Services WASHINGTON, D.C. - The National Nuclear Security ... Environmental Program Services Contract Environmental ...

  13. NNSA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense

  14. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  15. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  16. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  17. Nuclear Safeguards and Security Challenge:

    National Nuclear Security Administration (NNSA)

    Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards

  18. nest | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nest Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management Coordination HQ Emergency Management Team Responding to Emergencies Consequence Management First Responders Operations Render Safe Nuclear Forensics International... Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security Council-sponsored policy initiative that establishes

  19. Armenia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Armenia Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  20. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  1. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  2. Global Security 2009

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    523744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch

  3. Cyber Securing Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Control Systems Integration into the DoD Networks A Briefing in Response to House Report 113-102, Accompanying the FY14 National Defense Authorization Act Unclassified - Distribution Statement A August, 2015 Cyber Securing Control Systems Acquisition, Technology and Logistics 2 DoD Scope of Platform IT & Control Systems * Acquisitions / Weapon Systems - H,M & E (ships / subs, missiles, UVs, etc.) - Training Simulators, 3D printing, etc. * EI&E - Buildings & linear

  4. Dual LED/incandescent security fixture

    DOE Patents [OSTI]

    Gauna, Kevin Wayne

    2005-06-21

    A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

  5. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber ...

  6. Santa | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Santa Santa Even Santa was subjected to security checks

  7. Fundamental science investigations to develop a 6-MV laser triggered gas switch for ZR: first annual report.

    SciTech Connect (OSTI)

    Warne, Larry Kevin; Van Den Avyle, James A.; Lehr, Jane Marie; Rose, David; Krompholz, Hermann G.; Vela, Russell; Jorgenson, Roy Eberhardt; Timoshkin, Igor (University of Strathclyde, Glasgow, Scotland); Woodworth, Joseph Ray; Prestwich, Kenneth Randel (Voss Scientific, Albuquerque, NM); Krile, John; Given, Martin (University of Strathclyde, Glasgow, Scotland); McKee, G. Randall; Rosenthal, Stephen Edgar; Struve, Kenneth William; Welch, Dale Robert (Voss Scientific, Albuquerque, NM); Benwell, Andrew L. (University of Missouri-Columbia, Columbia, Missouri); Kovaleski, Scott; LeChien, Keith, R.; Johnson, David (Titan Pulse Sciences Division); Fouracre, R.A. (University of Strathclyde, Glasgow, Scotland); Yeckel, Chris (University of Missouri-Columbia, Columbia, Missouri); Wakeland, Peter Eric; Miller, A. R. (Titan Pulse Sciences Division); Hodge, Keith Conquest (Ktech Corporation, Albuquerque, NM); Pasik, Michael Francis; Savage, Mark Edward; Maenchen, John Eric; Curry, Randy D.; Feltz, Greg; Bliss, David Emery; MacGregor, Scott (University of Strathclyde, Glasgow, Scotland); Corley, J. P. (Ktech Corporation, Albuquerque, NM); Anaya, Victor (Ktech Corporation, Albuquerque, NM); Wallace, Zachariah (Ktech Corporation, Albuquerque, NM); Thoma, Carsten (Voss Scientific, Albuquerque, NM); Neuber, Andreas. (Texas Tech University, Lubbock, TX)

    2007-03-01

    In October 2005, an intensive three-year Laser Triggered Gas Switch (LTGS) development program was initiated to investigate and solve observed performance and reliability issues with the LTGS for ZR. The approach taken has been one of mission-focused research: to revisit and reassess the design, to establish a fundamental understanding of LTGS operation and failure modes, and to test evolving operational hypotheses. This effort is aimed toward deploying an initial switch for ZR in 2007, on supporting rolling upgrades to ZR as the technology can be developed, and to prepare with scientific understanding for the even higher voltage switches anticipated needed for future high-yield accelerators. The ZR LTGS was identified as a potential area of concern quite early, but since initial assessments performed on a simplified Switch Test Bed (STB) at 5 MV showed 300-shot lifetimes on multiple switch builds, this component was judged acceptable. When the Z{sub 20} engineering module was brought online in October 2003 frequent flashovers of the plastic switch envelope were observed at the increased stresses required to compensate for the programmatically increased ZR load inductance. As of October 2006, there have been 1423 Z{sub 20} shots assessing a variety of LTGS designs. Numerous incremental and fundamental switch design modifications have been investigated. As we continue to investigate the LTGS, the basic science of plastic surface tracking, laser triggering, cascade breakdown, and optics degradation remain high-priority mission-focused research topics. Significant progress has been made and, while the switch does not yet achieve design requirements, we are on the path to develop successively better switches for rolling upgrade improvements to ZR. This report summarizes the work performed in FY 2006 by the large team. A high-level summary is followed by detailed individual topical reports.

  8. Microsoft Word - Critical Infrastructure Security and Resilience...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2013 CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE MONTH, 2013 - - - - - - - BY THE ...

  9. Departmental Personnel Security - Implementation Guidance | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Departmental Personnel Security - Implementation Guidance Implementation Guidance Overview of Security ClearanceAccess Authorization Process for Applicants Drug Testing ...

  10. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    violations of Department of Energy's classified information security program ... Sheet, Preliminary Notice of Violation: Classified Information Security Event at NNSS ...

  11. Office of Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and security policy for the protection of the National Security and other critical assets entrusted to the Department. The Office protects the Department's critical assets and national security by providing security expertise to assist Headquarters and field elements in planning site protection strategies and by coordinating

  12. Reading Municipal Light Department - Business Lighting Rebate...

    Broader source: Energy.gov (indexed) [DOE]

    with Electronic Ballasts: 100fixture De-lamping: 4 - 9lamp Lighting Sensors: 20sensor LED Exit Signs: 20fixture Summary Reading Municipal Light Department (RMLD) offers...

  13. White Light Creation Architectures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Frontier Research Centers: Solid-State Lighting Science Center for Frontiers of ... White Light Creation Architectures HomeEnergy ResearchEFRCsSolid-State Lighting Science ...

  14. Light Creation Materials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Frontier Research Centers: Solid-State Lighting Science Center for Frontiers of ... Light Creation Materials HomeEnergy ResearchEFRCsSolid-State Lighting Science EFRC...

  15. light-emitting diode

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Cost The high-brightness, rapidly pulsed, multicolor light-emitting diode (LED) driver delivers lighting performance that exceeds that of conventional (laserarc-light) sources ...

  16. Dye filled security seal

    DOE Patents [OSTI]

    Wilson, Dennis C. W.

    1982-04-27

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

  17. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  18. Army Energy Security Considerations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed

  19. NNSA: Securing Domestic Radioactive Material | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) NNSA: Securing Domestic Radioactive Material February 01, 2011 In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." The

  20. Y-12 National Security Complex | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Y-12 National Security Complex Y-12 National Security Complex is the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. It excels in materials science and precision manufacturing and stores enriched uranium. Y-12 supports efforts to reduce nuclear proliferation risk and performs work for other government agencies. It is managed by the NNSA Production Office and run by Consolidated Nuclear Security, LLC. Visit our

  1. office of secure transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    office of secure transportation Eight new couriers make the grade, join NNSA's Office of Secure Transportation Earlier this month, the Office of Secure Transportation (OST) welcomed eight new Nuclear Material Courier Federal Agents into the fold during a graduation ceremony at Kirtland Air Force Base in Albuquerque, NM. The selection process is rigorous for this vital position, and fewer than 2 percent of... Acquisition and Project Management Office volunteers get up-close look at Office of

  2. About the Solid-State Lighting Program | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    About the Solid-State Lighting Program About the Solid-State Lighting Program The Energy Policy Act of 2005 (EPACT 2005) and the Energy Independence and Security Act of 2007 (EISA 2007) issued directives to the Secretary of Energy to carry out a Next Generation Lighting Initiative to support SSL R&D. The legislation directs DOE to support research, development, demonstration, and commercial application activities related to advanced SSL technologies. In order to effectively fulfill the

  3. Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting LED Parking Lighting in Federal Facilities FEDERAL ENERGY MANAGEMENT PROGRAM With technical assistance from the Federal Energy Management Program (FEMP), the Marine Corps Base Quantico (MCBQ) recently undertook a major overhaul of its outdoor lighting, boosting safety and security throughout the site, while cutting energy costs and earning a national award in the process. The MCBQ replaced nearly 2,000 old and ineffcient street

  4. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    This document reviews several key operational cyber security elements that are important for control systems and industrial networks and how those elements can drive the creation ...

  5. Bio-Inspired Cyber Security for Smart Grid Deployments

    SciTech Connect (OSTI)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  6. An integrated solution for secure group communication in wide-area networks

    SciTech Connect (OSTI)

    Agarwal, Deborah A.; Chevassut, Olivier; Thompson, Mary; Tsudik, Gene

    2001-04-01

    Many distributed applications require a secure reliable group communication system to provide coordination among the application components. This paper describes a secure group layer (SGL) which bundles a reliable group communication system, a group authorization and access control mechanism, and a group key agreement protocol to provide a comprehensive and practical secure group communication platform. SGL also encapsulates the standard message security services (i.e, confidentiality, authenticity and integrity). A number of challenging issues encountered in the design of SGL are brought to light and experimental results obtained with a prototype implementation are discussed.

  7. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  8. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  9. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  10. LBNL SecureMessaging

    Energy Science and Technology Software Center (OSTI)

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanentmore » and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.« less

  11. LBNL SecureMessaging

    SciTech Connect (OSTI)

    Pery, Marcia; Agarwal, Deb

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanent and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.

  12. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  14. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  15. #meetamachine | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    #meetamachine Meet a Machine: Explosive science is booming at Livermore Lab's Contained Firing Facility A key mission of the National Nuclear Security Administration is to maintain the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear explosive testing. Data gathered from experiments at the Contained Firing Facility (CFF) help validate computer... Meet a Machine: Sandia Labs' Thor doesn't need a hammer to support national security Thor's aim is to study

  16. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    budget National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today... FY2016 Budget Request: Positioned for the 21st Century Mission Delivery Washington, DC - U.S. Department of Energy

  17. cdns | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cdns Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes,

  18. community | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    community NNSS celebrates its 65 anniversary The Nevada National Security Site (NNSS) celebrates its 65th anniversary this year. The first on-site test occurred on January 27, 1951, when the Able Test was detonated on Frenchman Flat. Among the many activities NNSS officials are holding to commemorate the milestone is an open house for... Who's on FIRST? Inspiring STEM through robotics Consolidated Nuclear Security, LLC, which runs the Y-12 National Security Complex and the Pantex Plant, plays an

  19. mac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    mac Military Academy Cadet/Midshipman Program This program places military academy cadets/midshipmen in tours of duty within science, technology, engineering, national security, and relevant fields at any of the NNSA sites. Participants will expand their understanding of the NNSA National Security Enterprise and Department of Defense programs... Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance

  20. operations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    operations NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building... Infrastructure and Operations NNSA's missions require a secure production and laboratory infrastructure meeting immediate and long term needs. The

  1. ost | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ost Eight new couriers make the grade, join NNSA's Office of Secure Transportation Earlier this month, the Office of Secure Transportation (OST) welcomed eight new Nuclear Material Courier Federal Agents into the fold during a graduation ceremony at Kirtland Air Force Base in Albuquerque, NM. The selection process is rigorous for this vital position, and fewer than 2 percent of... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense

  2. policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA Deputy promotes collaboration on global deterrence at USSTRATCOM deterrence symposium Last month more than 650

  3. China | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    China U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... NNSA Deputy Administrator Creedon Travels to China In March, National Nuclear Security

  4. DOE | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    DOE DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA & DOE Employees Use Tiny Smartphone Microscopes to Teach STEM Users discovered items the device could magnify, such

  5. Principal Associate Director - Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  6. Center for Control System Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Control System Security Critical Infrastructure is at Risk As America's infrastructures have become more complex and interconnected, their operation and control has become more complicated as well. Automated control systems have been widely deployed to operate these infrastructures, and coupled with the networks they use to transfer data are a security vulnerability for the infrastructures they control. The Center for Control System Security at Sandia National Laboratories works with several

  7. rsl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiation Monitoring Survey over Boston April 17-20 BOSTON - The National Nuclear Security Administration (NNSA) will measure naturally occurring background radiation over areas ...

  8. Newsletters | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the nuclear security enterprise. Online archives are available back to 2003. NNSA publishes a monthly newsletter featuring current events and activities across the nuclear ...

  9. performance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    performance | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. computing | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    computing | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. sites | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    sites | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. airport | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    airport | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Romania | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Romania | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. ap | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ap | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  15. lllnl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    lllnl | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Links | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Links | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. fleet | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    fleet | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. NSTec | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  19. Savannah | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  20. green | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  1. supercomputer | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA's missions get a boost from brain-inspired, radically different computer design The first computers to contribute to the nation's nuclear security work used thousands of ...

  2. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy(...

  3. Transportation Security | Department of Energy

    Office of Environmental Management (EM)

    Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste Shipment Indiana Department of Homeland...

  4. Library | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog NNSA & Nuclear Security Enterprise support nation's preparedness NNSA Blog NNSA's work aids in fight against cancer NNSA Blog NSC leader recognized as community role model...

  5. Compensation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog NNSA & Nuclear Security Enterprise support nation's preparedness NNSA Blog NNSA's work aids in fight against cancer NNSA Blog NSC leader recognized as community role model...

  6. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other ...

  7. SSAC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    SSAC NNSA and IAEA Hold the 20th International Training Course on Nuclear Material Accounting and Control Washington, D.C. - The National Nuclear Security Administration (NNSA)...

  8. ONAC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ONAC NNSA and IAEA Hold the 20th International Training Course on Nuclear Material Accounting and Control Washington, D.C. - The National Nuclear Security Administration (NNSA)...

  9. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Local Security Office (LSO) cited a DOE psychiatrist's diagnoses of Post-Traumatic Stress Disorder and Delusional Disorder. The Administrative Judge found that the individual...

  10. recycling | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    recycling | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  12. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA Provides Tajikistan Specialized...

  13. radiation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA to Conduct Aerial Radiological...

  14. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    alleged that the individual's admission that he had taken one of his dog's prescription pain pills (Tramadol) constituted illegal drug use which raised significant security...

  16. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  17. Headquarters Facilities Master Security Plan

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The servicing badge office provides information on how to access the online briefing. The ... The briefing includes an overview of HQ security programs, access control procedures, ...

  18. Jamaica | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Jamaica Jamaica NNSA Removes U.S.-Origin HEU from Jamaica, Makes the Caribbean HEU Free WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration...

  19. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  20. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Acceptable use policy Account and password policy Configuration management Security ... Accounts and Passwords The account and password policy will describe proper care of ...

  1. Security Notice | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User login Username * Password * Request new password Log in Forgot Your Password? Security Notice This computer system is operated on a U.S. Federal Government network ...

  2. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an Information Systems Security Officer (ISSO) and as many Alternate ISSOs as ...

  3. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance ...

  4. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Classified Matter Channels Maretta King mking@sandia.gov 505-284-0827 Clearance Office - Clearance Reinvestigations security@sandia.gov 505-845-1321 - Clearance Terminations ...

  5. leadership | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    for a facility tour of the new National Security Campus and to receive project briefings on its proliferation deterrence programs. During the visit, Harrington toured the... ...

  6. gtri | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    European Union and the United States of America, which actively promote the use of the highest safety, security and non-proliferation standards in countries using nuclear energy. ...

  7. Office of Global Material Security

    National Nuclear Security Administration (NNSA)

    at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In total, 55 participants from 15 countries and 9 international...

  8. supercompuring | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Home supercompuring NNSA's missions get a boost from brain-inspired, radically different computer design The first computers to contribute to the nation's nuclear security work ...

  9. Australia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Australia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. Safeguards & Security | Department of Energy

    Energy Savers [EERE]

    The mission of the PPPO Safeguards and Security Program is to effectively implement the Office of Environmental Management ... Serves as the Federal liaison with the Nuclear Regulatory ...

  11. FEMA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    of Energy (DOE) and the Environmental Protection Agency (EPA), ... Testing The National Nuclear Security Administration (NNSA) and Federal Emergency Management Agency (FEMA) under ...

  12. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to administrative review citing as security concerns the individual's diagnosis of alcohol abuse and his alcohol-related arrests. After conducting a hearing, convened at the...

  14. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of the individual to address concerns about his falsification of information and alcohol use. The individual's behavior raised security concerns under Criteria F, H and L....

  15. Security and Privacy Notices | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory monitors this Web site for ...

  16. Lighting system with thermal management system having point contact synthetic jets

    DOE Patents [OSTI]

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr, Charles Franklin; Sharma, Rajdeep

    2016-08-30

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  17. Lighting system with thermal management system having point contact synthetic jets

    SciTech Connect (OSTI)

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2013-12-10

    Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  18. Lighting system with thermal management system having point contact synthetic jets

    DOE Patents [OSTI]

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2016-08-23

    Lighting systems having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  19. Chapter_11_Incidents_of_Security_Concern

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. AU-42 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect

  20. Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  1. Multipartite secure state distribution

    SciTech Connect (OSTI)

    Duer, W.; Briegel, H.-J.; Calsamiglia, J.

    2005-04-01

    We introduce the distribution of a secret multipartite entangled state in a real-world scenario as a quantum primitive. We show that in the presence of noisy quantum channels (and noisy control operations), any state chosen from the set of two-colorable graph states (Calderbank-Shor-Steane codewords) can be created with high fidelity while it remains unknown to all parties. This is accomplished by either blind multipartite entanglement purification, which we introduce in this paper, or by multipartite entanglement purification of enlarged states, which offers advantages over an alternative scheme based on standard channel purification and teleportation. The parties are thus provided with a secret resource of their choice for distributed secure applications.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  3. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect (OSTI)

    Sweeney, D. J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  4. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  5. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta; Shankar, Harihar; Joshi, Sunjoy

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  6. BUILDER | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    BUILDER NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building

  7. SPE | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    SPE NNSA administrator visits NNSS to meet team, see national security work Last month, Department of Energy Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) visited NNSA's Nevada Field Office where he hosted an all-hands for NNSA-Nevada staff and presented several service awards. During the trip he visited the NNSA

  8. cyber | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cyber Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or NNSA and Department of Energy (DOE) directives.Classified Matter Protection and Control ensures the protection and control of

  9. inspection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    inspection NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports

  10. npcr | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    npcr NNSA Delivers Annual Reports to Congress on Progress for Stockpile Stewardship and Nuclear Nonproliferation WASHINGTON, D.C.-The Department of Energy's National Nuclear Security Administration (DOE/NNSA) today released the annual reports outlining the strategic direction for two of its vital and enduring missions-maintaining a safe, secure and effective nuclear deterrent and reducing the threat of

  11. testing | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testing Meet a Machine: Explosive science is booming at Livermore Lab's Contained Firing Facility A key mission of the National Nuclear Security Administration is to maintain the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear explosive testing. Data gathered from experiments at the Contained Firing Facility (CFF) help validate computer

  12. 2016 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    2016 FY2016 Budget Request: Positioned for the 21st Century Mission Delivery Washington, DC - U.S. Department of Energy (DOE) Under Secretary for Nuclear Security and National Nuclear Security Administration (NNSA) Administrator Lt. Gen. (Ret) Frank Klotz highlighted the strong support for NNSA in President Obama's Fiscal Year 2016 Budget Request. Delivered to Congress

  13. NMIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NMIP Pantex Plant's Calvin Nelson honored as Analyst of the Year for Transportation Security Pantex's Calvin Nelson was recently awarded the 2015 Analyst of the Year for Transportation Security by the Department of Energy's Nuclear Materials Information Program. The award, for which Nelson is the first-ever Pantex recipient, recognizes outstanding analytic support to the NMIP. All

  14. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  15. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  16. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  17. PANTHER | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    PANTHER Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a disaster or national tragedy, bits of information often are found afterward among vast amounts of available data that might have mitigated or even prevented what happened, had they been recognized ahead of time. In this information age, national security analysts often

  18. grant | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    grant Consortium Led by University of California, Berkeley Awarded $25M NNSA Grant for Nuclear Science and Security Research Through Grant, Consortium of Eight Universities to Continue Work with Nuclear Labs on Research & Development WASHINGTON - The Department of Energy's National Nuclear Security Administration (NNSA) announced a grant award of $25 million to a University of California, Berkeley-led consortium of...

  19. police | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    police Perfecting marksmanship: Sandia California Security Police Officers train to improve skills In training, the Protective Force has looked carefully at this threat to identify trends, courses of action, and response techniques. Training trumps everything. Security Police Officers (SPO) at Sandia/California continue to far exceed the minimum standard of required training. Pablo Maurino, the

  20. surveillance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    surveillance Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a disaster or national tragedy, bits of information often are found afterward among vast amounts of available data that might have mitigated or even prevented what happened, had they been recognized ahead of time. In this information age, national security analysts often

  1. NPT Compliance | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    NPT Compliance Maintaining the safety, security and effectiveness of the nuclear deterrent without nuclear testing - especially at lower numbers - requires increased investments across the nuclear security enterprise. Maintaining the safety, security and effectiveness of the nuclear deterrent without nuclear testing - especially at lower numbers - requires increased investments across the nuclear security enterprise. Maintaining the safety, security and effectiveness of a smaller nuclear

  2. Advanced Metering Infrastructure Security Considerations | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Metering Infrastructure Security Considerations Advanced Metering Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to secure that implementation appropriately. We intend that utilities use this report to guide their planning, procurement, roll-out, and assessment of the security of Advanced Metering Infrastructure. Advanced Metering Infrastructure Security

  3. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  4. Novel Nanoparticle Production Method Could Lead to Better Lights, Lenses,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Cells Nanoparticle Production Method Could Lead to Better Lights, Lenses, Solar Cells - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization

  5. Brief History of Solid-State Lighting Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solid-State Lighting Technology - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  6. Consortium for Advanced Simulation of Light Water Reactors (CASL)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Light Water Reactors (CASL) - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  7. Mobile lighting apparatus

    DOE Patents [OSTI]

    Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

    2013-05-14

    A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

  8. Headquarters Facilities Master Security Plan - Chapter 12, Special...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Headquarters Facilities Master Security Plan - Acronyms ...

  9. Fiber optic security seal including plural Bragg gratings

    DOE Patents [OSTI]

    Forman, P.R.

    1994-09-27

    An optical security system enables the integrity of a container seal to be remotely interrogated. A plurality of Bragg gratings is written holographically into the core of at least one optical fiber placed about the container seal, where each Bragg grating has a predetermined location and a known frequency for reflecting incident light. A time domain reflectometer is provided with a variable frequency light output that corresponds to the reflecting frequencies of the Bragg gratings to output a signal that is functionally related to the location and reflecting frequency of each of the Bragg gratings. 2 figs.

  10. Fiber optic security seal including plural Bragg gratings

    DOE Patents [OSTI]

    Forman, Peter R.

    1994-01-01

    An optical security system enables the integrity of a container seal to be remotely interrogated. A plurality of Bragg gratings is written holographically into the core of at least one optical fiber placed about the container seal, where each Bragg grating has a predetermined location and a known frequency for reflecting incident light. A time domain reflectometer is provided with a variable frequency light output that corresponds to the reflecting frequencies of the Bragg gratings to output a signal that is functionally related to the location and reflecting frequency of each of the Bragg gratings.

  11. Nuclear Security Conference 2010 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear ... Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. ...

  12. Performance Evaluations | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Performance Evaluations Kansas City National Security Campus (formerly Kansas City Plant) Lawrence Livermore National Laboratory Los Alamos National Laboratory Nevada National Security Site Pantex Plant Sandia National Laboratories Savannah River Site Y-12 National Security Complex

  13. Departmental Personnel Security- Policy and Procedures

    Office of Energy Efficiency and Renewable Energy (EERE)

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  14. Office of Headquarters Personnel Security Operations

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  15. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    O 470.4B, Safeguards and Security Program by Mary Gallion Functional areas: Safety, Safety and Security, Security, Work Processes, To establish responsibilities for the U.S....

  16. Categorical Exclusion Determinations: Health, Safety, and Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Health, Safety, and Security Categorical Exclusion Determinations: Health, Safety, and Security Categorical Exclusion Determinations issued by Health, Safety, and Security. DOCUMENTS AVAILABLE FOR DOWNLOAD No downloads found for this office.

  17. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  18. PIA - WEB Physical Security Major Application | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application ...

  19. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a...

  20. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...