National Library of Energy BETA

Sample records for number secure file

  1. OHA Security Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

  2. Social Security Number Reduction Project | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Social Security Number Reduction Project Social Security Number Reduction Project The document below provides information regarding acceptable uses of the Social Security Number (SSN). PDF icon Baseline Inventory.pdf More Documents & Publications DOE Guidance on the Use of the SSN Manchester Software 1099 Reporting PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory

  3. NNSA Achievements: 2015 by the Numbers | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Achievements: 2015 by the Numbers VIDEO: 2015 by the numbers How did we perform this year? What did we accomplish? NNSA's nuclear security enterprise - including its laboratories, production facilities, and sites - provides unique technical solutions to solve the national security challenges of today and the future. In 2015, in addition to the Stockpile Stewardship and Management Plan and Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats, NNSA

  4. Department of Energy FILE& National Nuclear Secur~ty Administration

    Office of Legacy Management (LM)

    FILE& National Nuclear Securty Administration Nevada Site Office 2005 M U 22 AII 9 5 ... Salmon Site location) 2. Two underground nuclear tests conducted by DOE during the 1960's, ...

  5. Method for data compression by associating complex numbers with files of data values

    DOE Patents [OSTI]

    Feo, John Thomas; Hanks, David Carlton; Kraay, Thomas Arthur

    1998-02-10

    A method for compressing data for storage or transmission. Given a complex polynomial and a value assigned to each root, a root generated data file (RGDF) is created, one entry at a time. Each entry is mapped to a point in a complex plane. An iterative root finding technique is used to map the coordinates of the point to the coordinates of one of the roots of the polynomial. The value associated with that root is assigned to the entry. An equational data compression (EDC) method reverses this procedure. Given a target data file, the EDC method uses a search algorithm to calculate a set of m complex numbers and a value map that will generate the target data file. The error between a simple target data file and generated data file is typically less than 10%. Data files can be transmitted or stored without loss by transmitting the m complex numbers, their associated values, and an error file whose size is at most one-tenth of the size of the input data file.

  6. Method for data compression by associating complex numbers with files of data values

    DOE Patents [OSTI]

    Feo, J.T.; Hanks, D.C.; Kraay, T.A.

    1998-02-10

    A method for compressing data for storage or transmission is disclosed. Given a complex polynomial and a value assigned to each root, a root generated data file (RGDF) is created, one entry at a time. Each entry is mapped to a point in a complex plane. An iterative root finding technique is used to map the coordinates of the point to the coordinates of one of the roots of the polynomial. The value associated with that root is assigned to the entry. An equational data compression (EDC) method reverses this procedure. Given a target data file, the EDC method uses a search algorithm to calculate a set of m complex numbers and a value map that will generate the target data file. The error between a simple target data file and generated data file is typically less than 10%. Data files can be transmitted or stored without loss by transmitting the m complex numbers, their associated values, and an error file whose size is at most one-tenth of the size of the input data file. 4 figs.

  7. Nevada National Security Site Cleanup By the Numbers | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nevada National Security Site Cleanup By the Numbers Nevada National Security Site Cleanup By the Numbers Nevada National Security Site Cleanup By the Numbers In 2015, EM developed site infographics highlighting each sites history and important metrics including: Decontamination and demolition of facilities and waste sites Secure storage of spent fuel Retrieval of radioactive sludge and saltcake from tanks Treatment of contaminated groundwater Waste safely stored in an underground repository

  8. FILE

    Office of Legacy Management (LM)

    c&o--L>+ co.o-09 Epq-J+jDU" 1 . o( 5--- 1, "I ' -i, . - -. j s: FILE :3r.jNER is ---.- pas',: Current: -------------- ----- Cwner...

  9. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  10. Mo Year Report Period: EIA ID NUMBER:

    U.S. Energy Information Administration (EIA) Indexed Site

    Mo Year Report Period: EIA ID NUMBER: http:www.eia.govsurveyformeia14instructions.pdf Mailing Address: Secure File Transfer option available at: (e.g., PO Box, RR) https:...

  11. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  12. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and...

  13. File Storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and...

  14. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration. ...

  15. Security, Emergency Planning & Safety Records | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records Protection program records include the various files created by the Department to ...

  16. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and state regulators,

  17. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signatures on File

  18. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signatures on File

  19. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  20. Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature on File Signature on File 5/29/08

  1. File and Directory Management Tool: view, organize, transfer files () |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect File and Directory Management Tool: view, organize, transfer files Citation Details Software Request Title: File and Directory Management Tool: view, organize, transfer files Not Specified Authors: Smith, N. G. ; O'Neill, N. J. ; Spencer, P. N. ; Long, J. W. Publication Date: 2008-03-14 OSTI Identifier: 1231070 Report Number(s): Hopper V2.0; 002218MLTPL00 LLNL-CODE-403380 DOE Contract Number: AC52-07NA27344 Software Revision: 00 Software Package Number: 002218 Software

  2. Access Your Files | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Your Files Access your files stored on Box, without the need for VPN. Box is Argonne's secure cloud-based file storage system that provides an easy way to organize, edit, share, and collaborate on files anywhere, on any device, without the need for VPN. Box provides document workflow tools, including task assignments and tracking. Box basic functionality can be enhanced with optional apps. It can be used on many operating systems and devices, including desktop and laptop computers, tablets, and

  3. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Files systems Files systems NERSC's global home and project file systems are available on Franklin. Additionally, Franklin has over 400 TB of locally attached high-performance /scratch disk space For information on the NERSC file systems, see the link at right. Scratch File Systems Size Aggregate Peak Performance # IO Servers Interconnect File System Software Disk Array Vendor $SCRATCH 209 TB 17 GB/sec 24 Lustre DDN $SCRATCH2 209 TB 17 GB/sec 24 Lustre DDN SCRATCH and SCRATCH2 There are two

  4. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ATLAS uses the various systems: common In the past ATLAS used common primarily for their...

  5. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ALICE uses the various systems: /common ALICE uses /common to build the software that supports its grid-based automated production work. This software includes AliRoot, Geant, AliEn, and XRootD. /eliza6, /eliza8, /eliza17 ALICE has space on 3 elizas: 16TB on /eliza6, 6TB on /eliza8 and 11TB on /eliza17. The space on

  6. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the

  7. TSO-1105- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual’s security file, the Local Security...

  8. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  9. Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for...

  10. File Transfer Protocol Guard Version 1.5

    Energy Science and Technology Software Center (OSTI)

    1999-01-13

    The FTP Guard provides a means for securely transferring files from an unclassified network to a classified network. Files are moved using the FTP protocol. To a user, the FTP Guard appears to be an FTP proxy server. The FTP Guard does not move files from the classified network to the unclassified network.

  11. MPI File Tree Walk

    Energy Science and Technology Software Center (OSTI)

    2007-04-30

    MPI-FTW is a scalable MPI based software application that navigates a directory tree by dynamically allocating processes to navigate sub-directories found. Upon completion, MPI-FTW provides statistics on the number of directories found, files found, and time to complete. Inaddition, commands can be executed at each directory level.

  12. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security

  13. 1987 RECS Public Use Microdata Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cvs file File 3: Type of Energy and Equipment text file cvs file File 4: Household Demographics text file cvs file File 5: Presence of Appliances text file cvs file File 6: Energy...

  14. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  15. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  16. Lightweight File System (LWFS) v. 1.0

    Energy Science and Technology Software Center (OSTI)

    2008-11-19

    The Lightweight File System (LWFS) is a storage system that provides a minimal set of I/O-system functionality required by file system and/or I/O library implementations for massively parallel machines. In particular, the LWFS-core consists of a scalable security model, an efficient data-movement protocol, and a direct interface to object-based storage devices. Higher-level services such as namespace management, consistency semantics, reliability, and so forth are layered on top of the core services to provide application-specific functionalitymore » as needed. The LWFS code contains implementations of the core services and reference implementations of a number of supplemental services for namespace management and transaction support.« less

  17. Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Security Policy, Office of Security, Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU). The Office of Security...

  18. FileSys.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems May 3, 2011 David Turner NERSC User Services Group * Focus on user-writable file systems * Global file systems * Local file systems * Policies * Performance * Data movement * Data sharing * Platform summary * Hopper, Franklin, Carver/Magellan, Euclid, Datatrans (dtn01/dtn02) Overview * Some file systems are backed up for disaster recovery (of entire file system). * Some file systems are not backed up at all. * Restoration of individual files/directories is not

  19. RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Arnold, P. M.

    2013-02-21

    This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

  20. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  1. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  2. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  3. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  4. NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems NERSC File Systems Overview NERSC file systems can be divided into two categories: local and global. Local file systems are only accessible on a single platform, providing best performance; global file systems are accessible on multiple platforms, simplifying data sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively small storage for data like source code, shell

  5. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  6. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  7. CENTRAL FILES

    Office of Legacy Management (LM)

    / .- ~ _. ,- *-.* . . CENTRAL FILES +, a/ o(-t.z2-5 AlLO 1 Pab-FJr 3. 19% TYtxP REPaT To A&7bA cM.m rlmc)HA~ ON JANtJm 23, 1956 f. A. W~~~+Y, M.D. c. 1. 08huRann 8nd J. A. Hlaeririg ob3e8tilw of Trlpr in @ ttd~, (;rulw 2?), 1956, a ttip na nda to UM Crrrit &abw8tury, cword, Ohio. The purpow o? this trip u&a to aondwt the WMnd ti 8 #etia8 of indUrtF%al mgiene run~yr uhiah hre been Thwr8port ia 8 66mpondzLusofthe Amu4ll;rmtr forth&, rtsnyu@raaaderith~.~~M Alb8ugh,

  8. Dismantlement and Disposition | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Dismantlement and Disposition Maintaining the safety, security and effectiveness of the nuclear deterrent without nuclear testing - especially at lower numbers - requires increased investments across the nuclear security enterprise. Maintaining the safety, security and effectiveness of the nuclear deterrent without nuclear testing - especially at lower numbers - requires increased investments across the nuclear security enterprise. Weapons dismantlement [1] and disposition are major parts of

  9. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  10. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  11. Clearance Adjudication | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Clearance Adjudication The Office of Personnel and Facility Clearances and Classification (OPFCC) submits the clearance paperwork to the proper investigative agency, the Office of Personnel Management (OPM) or the Federal Bureau of Investigation (FBI). Upon receipt of the investigation, the paperwork is matched to the Personnel Security File and assigned to a Personnel Security Specialist, who will adjudicate the investigation, using the Presidential Adjudicative Guidelines. If security concerns

  12. NX Configuration File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Configuration File NX Configuration File This is the NX configuration file that you will need to connect to NERSC NX Server: NX5Confgure.nxs.zip To use this file, please follow the Online Tutorial. Last edited: 2016-04-29 11:34:57

  13. Secure computing for the 'Everyman'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure computing for the 'Everyman' Secure computing for the 'Everyman' If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. September 2, 2014 This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information

  14. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  15. Low Mach Number Models in Computational Astrophysics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ann Almgren Low Mach Number Models in Computational Astrophysics February 4, 2014 Ann Almgren. Berkeley Lab Downloads Almgren-nug2014.pdf | Adobe Acrobat PDF file Low Mach Number...

  16. FIC-16-0002- In the Matter of the National Security Archive

    Broader source: Energy.gov [DOE]

    On April 7, 2016, OHA issued a decision granting in part a FOIA Appeal filed by the National Security Archive from a determination issued to it by the DOE’s National Nuclear Security Administration...

  17. FIC-12-0003- In the Matter of the National Security Archive

    Broader source: Energy.gov [DOE]

    On August 7, 2015, OHA denied a FOIA Appeal filed by the National Security Archive of a determination issued by the Office of Intelligence and Counterintelligence (IN).  The National Security...

  18. PSH-11-0025- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual’s security file,...

  19. PSH-12-0020- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual is employed by a DOE contractor, and has held a DOE access authorization for several years. Based on financial issues contained in the individual’s security file, the Local Security...

  20. PSH-11-0021- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual’s security file,...

  1. Federal Register Volume 74 Number 48; Friday, March 13, 2009

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Division of Corporation Finance, U.S. Securities and Exchange Commission, 100 F Street, ... D filings be made online, through the Internet, using the EDGAR 1 17 CFR 232.10. 2 17 ...

  2. PSH-12-0055- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. On October 11, 2011, the individual filed for personal bankruptcy under Chapter 7 of the federal bankruptcy laws. Upon being apprised of this, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in order to address the security concerns raised by this filing.

  3. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  4. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Secur

  5. Fast Global File Status

    Energy Science and Technology Software Center (OSTI)

    2013-01-01

    Fast Global File Status (FGFS) is a system software package that implimints a scalable mechanism to retrieve file information, such as its degree of distribution or replication and consistency.

  6. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  7. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.

  8. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  10. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    From a Department of Defense (DoD) perspective, SMrs offer great advantage for energy security with stable fuel cost profiles, a secure installation for meeting base-load power demands with a robust, secured reactor design (i.e., energy security), potential to provide potable water and synthetic fuels, and a means to exceed DoD greenhouse gases (GhG) reduction goals. While presently SMrs are being proposed based on various reactor technologies, SMrs based on light-water reactor (lWr)

  12. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  13. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  14. security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit Participants in Apex Gold at Lawrence Livermore National Laboratory. What would national leaders do in the face of a transnational nuclear terrorism threat? Last week, ministers and other senior delegates from 37 nations, along with representatives from the International Atomic Energy Agency, the... Pantex Plant's Calvin Nelson honored as Analyst of the Year for Transportation Security

  15. Departmental Business Instrument Numbering System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-27

    The Order prescribes the procedures for assigning identifying numbers to all Department of Energy (DOE) and National Nuclear Security Administration (NNSA) business instruments. Cancels DOE O 540.1. Canceled by DOE O 540.1B.

  16. Departmental Business Instrument Numbering System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-12-05

    To prescribe procedures for assigning identifying numbers to all Department of Energy (DOE), including the National Nuclear Security Administration, business instruments. Cancels DOE 1331.2B. Canceled by DOE O 540.1A.

  17. Unix File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Permissions Unix File Permissions Brief Overview of Unix File Permissions Every file (and directory) has an owner, an associated Unix group, and a set of permission flags that specify separate read, write, and execute permissions for the "user" (owner), "group", and "other". Group permissions apply to all users who belong to the group associated with the file. "Other" is also sometimes known as "world" permissions, and applies to all users

  18. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and available to all the nodes in PDSF. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. You can display the UGE io units with the command "qconf -se global". Disk Vault Experiments SGE io

  19. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  20. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  1. Privacy and Security Notice | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the U.S. Government. It is for authorized use only. Users (authorized or unauthorized) have no explicit or implicit expectation of privacy. Any or all uses of this system, associated connected systems and all files may be intercepted, monitored, recorded, copied, audited, inspected, and disclosed to authorized site, Department of Energy, and law enforcement personnel, as well as authorized

  2. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  3. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security...

  4. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  11. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  12. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  13. CSV File Documentation: Consumption

    Gasoline and Diesel Fuel Update (EIA)

    Consumption Estimates The State Energy Data System (SEDS) comma-separated value (CSV) files ... SG still gas SN special naphthas SO solar thermal and photovoltaic energy TE total ...

  14. File:Bureauofreclamationfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 599 pixels....

  15. File:20121127144703735.pdf | Open Energy Information

    Open Energy Info (EERE)

    20121127144703735.pdf Jump to: navigation, search File File history File usage File:20121127144703735.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  16. File:Windyclassroom.pdf | Open Energy Information

    Open Energy Info (EERE)

    Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  17. File:Npsfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  18. File:Oregonshpodocumentationstandards.pdf | Open Energy Information

    Open Energy Info (EERE)

    Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 599 pixels....

  19. File:Noaafactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  20. File:Drillinghandbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Drillinghandbook.pdf Jump to: navigation, search File File history File usage File:Drillinghandbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  1. File:Energydatabusfacthseet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 599 pixels. Other...

  2. File:Bonnevillepowerfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 599 pixels. Other...

  3. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage and IO File storage and IO Disk Quota Change Request Form Franklin File Systems The Franklin system has 4 different file systems mounted which provide different...

  4. NNSA Production Office Open for Business | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Production Office Open for Business June 18, 2012 WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) Production Office (NPO) is now in operation, providing federal oversight of nuclear production missions at the Pantex Site in Amarillo, Texas, and the Y-12 National Security Complex in Oak Ridge, Tenn. File NPO Open Release 06.18

  5. Waltzer Receives NNSA Gold Medal Award | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Waltzer Receives NNSA Gold Medal Award June 26, 2014 Karl Waltzer, Acting Deputy Manager of the National Nuclear Security Administration's Production Office, has received the NNSA Gold Medal Award in recognition of his distinguished achievements in support of national security programs. File Waltzer Receives NNSA Gold Medal Award

  6. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  7. TFC-0010 - In the Matter of National Security Archive | Department of

    Energy Savers [EERE]

    Energy 10 - In the Matter of National Security Archive TFC-0010 - In the Matter of National Security Archive The National Security Archive filed an Appeal from a determination that the National Nuclear Security Administration (NNSA) issued on April 21, 2011. In that determination, NNSA denied in part a request for information that the National Security Archive had submitted on November 29, 2006, pursuant to the Freedom of Information Act (FOIA), 5 U.S.C. § 552. NNSA withheld information

  8. PSH-12-0050 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 50 - In the Matter of Personnel Security Hearing PSH-12-0050 - In the Matter of Personnel Security Hearing The individual's present employer, a DOE contractor, has requested a DOE access authorization for the individual. The individual completed and submitted an Electronic Questionnaire for Investigations Processing (QNSP) in November 2011. DOE Exhibit 8. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security

  9. Methods and apparatus for multi-resolution replication of files in a parallel computing system using semantic information

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Torres, Aaron

    2015-10-20

    Techniques are provided for storing files in a parallel computing system using different resolutions. A method is provided for storing at least one file generated by a distributed application in a parallel computing system. The file comprises one or more of a complete file and a sub-file. The method comprises the steps of obtaining semantic information related to the file; generating a plurality of replicas of the file with different resolutions based on the semantic information; and storing the file and the plurality of replicas of the file in one or more storage nodes of the parallel computing system. The different resolutions comprise, for example, a variable number of bits and/or a different sub-set of data elements from the file. A plurality of the sub-files can be merged to reproduce the file.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  13. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved within B 174. Use

  14. Secure Smart Grid Association | Open Energy Information

    Open Energy Info (EERE)

    Smart Grid Association Jump to: navigation, search Name: Secure Smart Grid Association Address: 2374 S Josephine St Place: Denver, Colorado Zip: 80210 Region: Rockies Area Number...

  15. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  16. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SAFETY RECORDS | Department of Energy 8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified information, special nuclear materials, nuclear weapons, other Government property) PDF icon ADMINISTRATIVE RECORDS SCHEDULE 18:

  17. T-645: Microsoft Security Bulletin Advance Notification

    Broader source: Energy.gov [DOE]

    Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any detection tools relevant to the updates.

  18. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is charged with

  19. Y-12 National Security Compex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Compex

  20. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  1. CAMD Policy Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lists: Caretakers, Accelerator Operators, Shift Operators Building Security: Policy Crane: Directive, Use, Procedure Emergency: Policy, Procedure Experimental Hall: Policy...

  2. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Request Number:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3023307 Name: Madeleine Brown Organization: nJa Address: --- -------- -------- -- Country: Phone Number: United States Fax Number: n/a E-mail: --- -------- --------_._------ --- Reasonably Describe Records Description: Please send me a copy of the emails and records relating to the decision to allow the underage son of Bill Gates to tour Hanford in June 2010. Please also send the emails and records that justify the Department of Energy to prevent other minors from visiting B Reactor. Optional

  5. Request Number:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1074438 Name: Gayle Cooper Organization: nla Address: _ Country: United States Phone Number: Fax Number: nla E-mail: . ~===--------- Reasonably Describe Records Description: Information pertaining to the Department of Energy's cost estimate for reinstating pension benefit service years to the Enterprise Company (ENCO) employees who are active plan participants in the Hanford Site Pension Plan. This cost estimate was an outcome of the DOE's Worker Town Hall Meetings held on September 17-18, 2009.

  6. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  7. NERSC Online Training May 3: Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Online Training May 3: Navigating NERSC File Systems NERSC Online Training May 3: Navigating NERSC File Systems April 26, 2011 by Richard Gerber A NERSC training event, "Navigating NERSC File Systems," will be presented Tuesday, May 3, 2011, from 10:00 -11:00 PDT. This event was postponed from April 26. The event will be presented simultaneously at the NERSC Oakland Scientific Facility and as a webcast. NERSC hosts a number of file storage systems, each with its unique characteristics.

  8. File:DIAsample.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 600 pixels. Full resolution (1,650 1,275 pixels, file...

  9. Hydrogen File Capture v1.0.DLL

    Energy Science and Technology Software Center (OSTI)

    2006-03-28

    Postprocessor for the use with GoldSim commercial software. The program is intended as a DLL for use with a GoldSim model simulation to copy input/output files created during the simulation to a central location on a local LAN. The software is used as part of a modeling package that consists of GoldSim.exe and other external codes linked and executed during a GoldSim model simulation. The FileCapture_v1.0.DLL is used to run Monte Carlo analyses with amore » GoldSim simulation that is executed using the distributed processing module. When distributed processing (i.e., multi-processor run) is used for a GoldSim Model simulation that is comprised of one or more codes linked with the GoldSim.exe, it is sometimes necessary to capture the default input and/or output files generated by the external codes linked with the GoldSim.exe program. Using the input file "FileCapture.In' to list the filenames and path, FileCapture_v1.0.DLL copies the files listed in 'FileCapture.in' from each node on the LAN to a folder called 'FCAP Files' created in the location gie as the path. The DLL will execute for each realization and append 00xxx a number indication which realization the file was generated from.« less

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0672P Sandia National Laboratories is developing a thermal-to-electric power conversion technology that utilizes carbon dioxide (CO2) as the working fluid in a closed Brayton cycle. This technology possesses the capability to generate electricity at high efficiencies while reducing both costs and greenhouse gas emissions.

  11. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  13. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ExcEptional sErvicE in thE national intErEst Investigating Containment Integrity Sandia is a nationally and internationally recognized leader in Nuclear Reactor containment research, supporting operations, lifetime extensions, and security and vulnerability assessments over a broad range of phenomena. Sandia's expertise includes evaluation of containment when subjected to high velocity impacts, enormous pressures and stresses, and attacks by saboteurs. Sandia's resources enable the completion of

  15. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after 9/11. these comprehensive analyses were able to realistically represent the actual attack, the response of the facility to the

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision applications to Systems assessment over the last three decades, Snl has developed and applied a Systems Engineering (SE) approach that includes performance assessment (pa) expertise to inform key decisions concerning radioactive waste management both in the US and internationally. the result of these efforts is a pa-based SE

  17. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  18. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  19. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a ---...e---e--- DATE 6j88 7 v---s -- ---... SUBJECT: ;&l a+-b IA Tcornqm Q afib4 SITE NAME: CITY: & &&at leg co ...

  20. (Document Number)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A TA-53 TOUR FORM/RADIOLOGICAL LOG (Send completed form to MS H831) _____________ _____________________________ _________________________________ Tour Date Purpose of Tour or Tour Title Start Time and Approximate Duration ___________________________ ______________ _______________________ _________________ Tour Point of Contact/Requestor Z# (if applicable) Organization/Phone Number Signature Locations Visited: (Check all that apply, and list any others not shown. Prior approval must be obtained

  1. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  2. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sector. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  3. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  4. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    physical security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  5. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear ...

  6. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for ...

  7. Fact #857 January 26, 2015 Number of Partner Workplaces Offering Electric Vehicle Charging More Than Tripled Since 2011 – Dataset

    Broader source: Energy.gov [DOE]

    Excel file with dataset for Number of Partner Workplaces Offering Electric Vehicle Charging More Than Tripled Since 2011

  8. Los Alamos National Security, LLC

    National Nuclear Security Administration (NNSA)

    Alamos National Security, LLC Contract No. DE-AC52-06NA25396 Modification No. 299 Page 2 of 2 Prime Contract Section J, Appendix G, List of Applicable Directives, is modified as follows: The following Directives are added: NUMBER DATE TITLE DOE O 205.1B Change 3 04/29/14 Department of Energy Cyber Security Program DOE O 484.1 Change 2 06/30/14 Reimbursable Work for Department of Homeland Security NNSA SD 473 09/10/14 Enterprise Mission Essential Task List-Based Protective Force Training Program

  9. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  11. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  12. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  13. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nonproliferation Global Material Security The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, as well as to build capacity to deter, detect and interdict the illicit trafficking of such materials. GMS achieves its mission through three subprograms: International Nuclear Security Radiological Security Nuclear Smuggling Detection and Deterrence (formerly Second Line of

  14. International Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such as

  15. File:NREL-banglmetst-221.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-banglmetst-221.pdf Jump to: navigation, search File File history File usage Selected Meteorological Stations and Elevation Size of this...

  16. PSH-12-0021- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007....

  17. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  18. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NSEC » Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5 665-1144 Email Energy Security Council The Los Alamos National Laboratory Energy Security Council works to develop new ideas for reliable, secure and sustainable carbon neutral energy solutions for the nation. We serve as the portal to LANL's diverse energy security research

  19. Setting up File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Setting up File Permissions Setting up File Permissions Recommendations for Setting up "Shared" Directories This section shows the recommended commands for setting up shared directories. Please read the full page to get an understanding of what these commands are doing. These recommendations are based on the common use-case at the JGI for user/group read/write and global read access. Creating a New Shared Directory dmj@genepool04:~$ umask 002 # or have this set in .bashrc.ext

  20. EEO Complaints Process | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Process A National Nuclear Security Administration employee or applicant for Federal employment may file an EEO complaint if the employee or applicant believes that he/she has been discriminated against based on one or more of these factors: Age Color Disability (Physical Or Mental) National Origin Race Religion Reprisal Sex (including Sexual Harassment) Genetic Information Sexual Orientation* * Prohibited by DOE policy The NNSA Complaints Process Brochure. EEO Complaint - Things to Consider EEO

  1. File:S-38-Well-Construction-and-Modification-Permit.pdf | Open...

    Open Energy Info (EERE)

    S-38-Well-Construction-and-Modification-Permit.pdf Jump to: navigation, search File File history File usage File:S-38-Well-Construction-and-Modification-Permit.pdf Size of this...

  2. OHA Misc Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our Misc decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  3. OHA FOIA Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our FOIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

  4. OHA Whistleblower Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our Whistleblower decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

  5. Look At (Search) Large Files

    Energy Science and Technology Software Center (OSTI)

    1992-07-13

    Scanning large files for information can be time consuming and expensive when using edit utilities on large mainframe computers. The reason is that editors must usually load the file into a buffer.

  6. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  7. Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  8. Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  9. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    J: FILE DATE r so ---w------m FROM: 9. 34oyc -w---v----- SUBJECT: D3 Bo;s CL&;C J mL-;+J; - Rcc cap 049 'A :j: &336;s L-.fh w-f L-1 ALE"nirTE ---...

  10. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  12. File:Mmpa.pdf | Open Energy Information

    Open Energy Info (EERE)

    Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6...

  13. File:Keystone.pdf | Open Energy Information

    Open Energy Info (EERE)

    Keystone.pdf Jump to: navigation, search File File history File usage File:Keystone.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  14. File:Handbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  15. File:Install.pdf | Open Energy Information

    Open Energy Info (EERE)

    Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  16. File:Hydrofracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  17. File:Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  18. File:Installnot.pdf | Open Energy Information

    Open Energy Info (EERE)

    Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  19. File:RSC.pdf | Open Energy Information

    Open Energy Info (EERE)

    RSC.pdf Jump to: navigation, search File File history File usage File:RSC.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  20. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    has the following 4 subcategories, out of 4 total. M Map Image Files Map PDF Files N NREL Map Files 1 pages S SWERA Map Files Media in category...

  1. File:Primer.pdf | Open Energy Information

    Open Energy Info (EERE)

    Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4...

  2. File:600.pdf | Open Energy Information

    Open Energy Info (EERE)

    600.pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  3. File:SGI.pdf | Open Energy Information

    Open Energy Info (EERE)

    SGI.pdf Jump to: navigation, search File File history File usage Metadata File:SGI.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  4. File:038392007).pdf | Open Energy Information

    Open Energy Info (EERE)

    8392007).pdf Jump to: navigation, search File File history File usage File:038392007).pdf Size of this preview: 463 599 pixels. Other resolution: 463 600 pixels. Go to page 1...

  5. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Cori File Systems The Cori system has 3 different user-accessible file systems; they provide different...

  6. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  7. File:Methane.pdf | Open Energy Information

    Open Energy Info (EERE)

    Methane.pdf Jump to: navigation, search File File history File usage File:Methane.pdf Size of this preview: 448 600 pixels. Go to page 1 2 3 4 5 Go next page next page ...

  8. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  9. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  10. Headquarters Security Quick Reference Book | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Quick Reference Book Headquarters Security Quick Reference Book June 2013 This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs. It is not meant to replace the DOE Headquarters Facilities Master Security Plan (HQFMSP), which provides detailed instructions for the implementation of DOE safeguards and security requirements as published in a number of DOE orders, policies, notices, and guides. This book is a tool that can be used

  11. Storage & File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration Mission / Managing the Stockpile Stockpile Stewardship and Management Plan This Department of Energy's (DOE) National Nuclear Security Administration (NNSA) Fiscal Year 2017 Stockpile Stewardship and Management Plan (SSMP) - Biennial Plan Summary (FY 2017 SSMP) is a key planning document for the nuclear security enterprise. This year's summary report updates the Fiscal Year 2016 Stockpile Stewardship and Management Plan (FY 2016 SSMP), the 25-year strategic program of record

  12. Nuclear Security Enterprise | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Study options for ensuring the safety, security, and reliability of nuclear warheads on a ... required to ensure the long-term safety, security, and reliability of the nuclear arsenal.

  13. Security Technologies for Open Networking Environments (STONE)

    SciTech Connect (OSTI)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi-domain scenarios is supported by a set of security engines that represent the core of the Federated Identities Management Server, which is also an extension of the Domain Security Server. The Federated Identity Management server allows users to federate their identities or terminate the federation between the service provider and the identity provider. At the service provider web site, the users are offered a list of identity providers to which they can choose to federate their identities. After users federate their identity, they can perform Single Sign-On protocol in an environment of federated domains. The group security system consists of a number of security technologies under a unified architecture, which supports creation of secure groups and execution of secure group transactions and applications in an open networking environment. The system is based on extensions of the GSAKMP standard for group key distribution and management. The Top layer is the Security Infrastructure with the Security Management and Administration System components and protocols that provide security functions common to all secure network applications The Middle layer is the Secure Group Protocols and Applications layer, consisting of the Policy and Group Key Distribution Server and Web-based (thin) Client. The Bottom layer is the supporting Middleware Security Platform, the cryptographic platform already described above. The group security system is designed to perform the functions necessary to create secure groups and enable secure group applications. Specifically, the system can manage group roles, create and disseminate a group security policy, perform authentication and authorization of users using PKI certificates and Web services security, generate group keys, and recover from compromises. In accordance with the GSAKMP standard, the group security system must perform all the required group life-cycle functions: group definition, group establishment, group maintenance, and group removal. The group security system has been designed to support four roles: The Security Domain Administrator is responsible for providing security functions defined in the top layer The Server Administrator. The central component of the group security system is the Policy and Group Key Distribution Server The Group Officer (GO) authorizes the creation of groups at a specific Policy and Group Key Distribution Server The Group Member (user) is any entity that participates in group transactions. Secure Group Applications The group security system has been designed to support four secure group applications: A Secure Instant Messaging: with the Secure Instant Messaging application A Secure Whiteboard A Secure Document Sharing A Secure Document Archiving: During the project, the group security system architecture was fully designed and preliminary prototyping was carried out for some of its components.

  14. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  15. Privacy and Security Research Group workshop on network and distributed system security: Proceedings

    SciTech Connect (OSTI)

    Not Available

    1993-05-01

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

  16. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  17. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  18. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... of September 24, 2011 3 The Department of Energy (DOE) National Nuclear Security ...

  20. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of...

  1. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  2. Dynamic Non-Hierarchical File Systems for Exascale Storage

    SciTech Connect (OSTI)

    Long, Darrell E.; Miller, Ethan L

    2015-02-24

    This constitutes the final report for “Dynamic Non-Hierarchical File Systems for Exascale Storage”. The ultimate goal of this project was to improve data management in scientific computing and high-end computing (HEC) applications, and to achieve this goal we proposed: to develop the first, HEC-targeted, file system featuring rich metadata and provenance collection, extreme scalability, and future storage hardware integration as core design goals, and to evaluate and develop a flexible non-hierarchical file system interface suitable for providing more powerful and intuitive data management interfaces to HEC and scientific computing users. Data management is swiftly becoming a serious problem in the scientific community – while copious amounts of data are good for obtaining results, finding the right data is often daunting and sometimes impossible. Scientists participating in a Department of Energy workshop noted that most of their time was spent “...finding, processing, organizing, and moving data and it’s going to get much worse”. Scientists should not be forced to become data mining experts in order to retrieve the data they want, nor should they be expected to remember the naming convention they used several years ago for a set of experiments they now wish to revisit. Ideally, locating the data you need would be as easy as browsing the web. Unfortunately, existing data management approaches are usually based on hierarchical naming, a 40 year-old technology designed to manage thousands of files, not exabytes of data. Today’s systems do not take advantage of the rich array of metadata that current high-end computing (HEC) file systems can gather, including content-based metadata and provenance1 information. As a result, current metadata search approaches are typically ad hoc and often work by providing a parallel management system to the “main” file system, as is done in Linux (the locate utility), personal computers, and enterprise search appliances. These search applications are often optimized for a single file system, making it difficult to move files and their metadata between file systems. Users have tried to solve this problem in several ways, including the use of separate databases to index file properties, the encoding of file properties into file names, and separately gathering and managing provenance data, but none of these approaches has worked well, either due to limited usefulness or scalability, or both. Our research addressed several key issues: • High-performance, real-time metadata harvesting: extracting important attributes from files dynami- cally and immediately updating indexes used to improve search. • Transparent, automatic, and secure provenance capture: recording the data inputs and processing steps used in the production of each file in the system. • Scalable indexing: indexes that are optimized for integration with the file system. • Dynamic file system structure: our approach provides dynamic directories similar to those in semantic file systems, but these are the native organization rather than a feature grafted onto a conventional system. In addition to these goals, our research effort will include evaluating the impact of new storage technolo- gies on the file system design and performance. In particular, the indexing and metadata harvesting functions can potentially benefit from the performance improvements promised by new storage class memories.

  3. Original Signature On File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature On File Department of Energy Carl sbad Field Office P. O. Box 3090 Carlsbad , New Mexico 8822 1 June 10, 2009 Mr. Steve Zappe, Project Leader Hazardous Waste Bureau New Mexico Environment Department 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Subject: Transmittal of CBFO Final Audit Report A-09-12 , Los Alamos National Laboratory Central Characterization Project TRU Waste Characterization and Certification Dear Mr. Zappe: Enclosed is the Carlsbad Field Office

  4. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    3 MEMORANDUM TO: FILE FROM: D, h&Z *_ --------------__ SITE NA,,E: -------- CITY: -%+&6!? -------------------------- STATE: CT cr: 13 ------ WNERL_S, Past: -------_____-----_-_____ current: -----------------------~-- Owner contacted q yes q no; if yes, date contacted / TYPE OF OPERATION ----------------- J& Research & Development i \ 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis m Production e9 Facility Type p

  5. Original Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signature on File Page8 of 8 M. EMERGENCY PROCEDURES 1. The owner/operator must maintain an adequately trained onsite RCRA emergency coordinator to direct emergency procedures which could resultfrom fires, explosions or releases of PCB containing waste at the Facility. The owner/operator must submitthe name and qualifications of the emergency coordinator within sixty (60) daysof the effective dateof this approval. 2. The owner/operator must maintain in good working orderany equipment

  6. Radiological Security Partnership | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership Information

  7. Grid collector: An event catalog with automated file management

    SciTech Connect (OSTI)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-10-17

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users.

  8. The Fifth Workshop on HPC Best Practices: File Systems and Archives

    SciTech Connect (OSTI)

    Hick, Jason; Hules, John; Uselton, Andrew

    2011-11-30

    The workshop on High Performance Computing (HPC) Best Practices on File Systems and Archives was the fifth in a series sponsored jointly by the Department Of Energy (DOE) Office of Science and DOE National Nuclear Security Administration. The workshop gathered technical and management experts for operations of HPC file systems and archives from around the world. Attendees identified and discussed best practices in use at their facilities, and documented findings for the DOE and HPC community in this report.

  9. Y-12 to Install New Fence to Reduce Trespassing | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration to Install New Fence to Reduce Trespassing March 28, 2013 The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. File 2013-03-28 NPO.docx

  10. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  11. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  13. File:01UTALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    Datasets Community Login | Sign Up Search File Edit History File:01UTALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01UTALandUsePlan...

  14. File:01CAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01CAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01CAALandUsePlanning.pdf Size of this preview: 463 599...

  15. File:01IDALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01IDALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01IDALandUseConsiderations.pdf Size of this preview:...

  16. File:08COCStateTransmissionProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    Community Login | Sign Up Search File Edit History File:08COCStateTransmissionProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08COCStateTransm...

  17. File:01MTALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01MTALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01MTALandUseConsiderations.pdf Size of this preview:...

  18. File:03COCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:03COCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03COCEncroachmentOverview.pdf Size of this preview: 463...

  19. File:0 - Overall Flow (Solar).pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:0 - Overall Flow (Solar).pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow (Solar).pdf Size of this preview: 463 ...

  20. DOE - Fossil Energy: Introduction Page to E-Filing System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    E-Filing Natural Gas Import & Export Regulation - E-Filing DOE's Natural Gas E-Filing System More Info E-Filing Instructions Go directly to e-Filing Form View Sample e-File...

  1. File:WSR flowchart-introduction.pdf | Open Energy Information

    Open Energy Info (EERE)

    Apps Datasets Community Login | Sign Up Search File Edit History File:WSR flowchart-introduction.pdf Jump to: navigation, search File File history File usage File:WSR...

  2. PSH-15-0093 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 3 - In the Matter of Personnel Security Hearing PSH-15-0093 - In the Matter of Personnel Security Hearing On February 17, 2016, an OHA Administrative Judge issued a decision in which he determined that an individual's request for DOE access authorization should not be granted. A local security office (LSO) found that the Internal Revenue Service (IRS) had filed tax liens against the individual in 2010 and 2013, totaling $157,873.09, and a state government had filed a tax lien against

  3. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement

  4. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    About / Our Programs / Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and

  5. Security Forms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  6. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    ' a 7 > 3gI, q OH.I-r7.-I (jt' , ""7 MEMORANDUM TO: FILE FROM: ' 'Y OIL&i cz ,,,',, -------we- SUBJECT: SITE NAME: _____ CITY:-AQY&- --------------e----e-- OWNER(S) Owner contacted n yes =urr="t: ----- -Llz2-:---,-- -----___ &,&/4$- '1 :) ' if yes, data contacted ------------- TYPE OF OPERATION ----------------- a Research t Development lti- Facility Type 0 Production scale testing a Manufacturing 5 University 0 Research Organization 0 Government Sponsored

  7. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' _ ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a --------e---e--- DATE 6j8/8 7 v---s -- ---------- SUBJECT: ;&l a+-b IA T~cornqm Q afib4 SITE NAME: CITY: & &&at leg co Current: ------------------------ Owner contacted 0 yes p no; if yem, date contacted --w---w------ TYPE OF OPERATION The T$SYI L-- Tj flmf ----------------- FResearch & Development a Facility 0 Production scale testing 0 Pilot Scale p Manufacturing 0 Bench Scale Process [3 University 0

  8. DOE FILE NO.

    Office of Legacy Management (LM)

    DOE FILE NO. _ ffi~15970 ADMIN RCD _ COMM REF _ pRwm BttO" SVR.l!s.j tJF PLE7l:JJER Rf) TECHNICAL SERVICES DIVISION (TSD) BACKFIT (Documents dated prior to 1 November 1988) FUSRAP COMMUNICATIONS DISTRIBUTION DOEiORO TECHNICAL SERVICES DIVISION (CE*53) BECHTEL NATIONAL INC. - JOB 14501 RESPONSE TRACKING INFORMATION PRIMARY, I lOWED BY: (ORG) I (ORG) TARGET DATE I I CLOSING CCN COMPL DATE ( ( CLOSING REF I I lOWED BY: (ORG) I I I I ( (ORG) TARGET DATE I CLOSING CCN COMPL DATE CLOSING REF

  9. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  10. Filing Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    We therefore encourage electronic filing of time-sensitive submissions. If you have any questions, please contact Fred Brown, Deputy Director, at (202) 287-1545. Mailing Address ...

  11. File:08MTATransmission (3).pdf | Open Energy Information

    Open Energy Info (EERE)

    08MTATransmission (3).pdf Jump to: navigation, search File File history File usage Metadata File:08MTATransmission (3).pdf Size of this preview: 463 599 pixels. Other...

  12. File:03NVCEncroachment (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    NVCEncroachment (1).pdf Jump to: navigation, search File File history File usage Metadata File:03NVCEncroachment (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  13. File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf | Open...

    Open Energy Info (EERE)

    FDCPURPAQualifyingFacilityCertificationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf Size...

  14. File:07TXBRECGeneratorCertification.pdf | Open Energy Information

    Open Energy Info (EERE)

    7TXBRECGeneratorCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07TXBRECGeneratorCertification.pdf Size of this preview: 463 599 pixels....

  15. File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 599...

  16. File:07FDBPlantCommissioning.pdf | Open Energy Information

    Open Energy Info (EERE)

    FDBPlantCommissioning.pdf Jump to: navigation, search File File history File usage Metadata File:07FDBPlantCommissioning.pdf Size of this preview: 463 599 pixels. Other...

  17. File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf ...

    Open Energy Info (EERE)

    HIAGeothermalAndCableSystemDevelopmentPermitting.pdf Jump to: navigation, search File File history File usage Metadata File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf...

  18. File:ApplicationtoAppropriate.pdf | Open Energy Information

    Open Energy Info (EERE)

    ApplicationtoAppropriate.pdf Jump to: navigation, search File File history File usage File:ApplicationtoAppropriate.pdf Size of this preview: 463 599 pixels. Other resolution:...

  19. File:08CABCaliforniaTransmissionCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    8CABCaliforniaTransmissionCPUCProcess.pdf Jump to: navigation, search File File history File usage File:08CABCaliforniaTransmissionCPUCProcess.pdf Size of this preview: 463 599...

  20. File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open...

    Open Energy Info (EERE)

    AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this...

  1. File:03ORENoncompetitiveGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORENoncompetitiveGeothermalLease.pdf Jump to: navigation, search File File history File usage Metadata File:03ORENoncompetitiveGeothermalLease.pdf Size of this preview: 463 599...

  2. File:07CAAPlantCommissioningProcessApplicationForCertification...

    Open Energy Info (EERE)

    7CAAPlantCommissioningProcessApplicationForCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07CAAPlantCommissioningProcessApplicationForCert...

  3. File:08IDAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08IDAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  4. File:03AKCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03AKCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  5. File:06ORATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06ORATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  6. File:06NVATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  7. File:08CAACaliforniaTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    CAACaliforniaTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08CAACaliforniaTransmission.pdf Size of this preview: 463 599 pixels. Other...

  8. File:06AKATransportationOversizeOverweight.pdf | Open Energy...

    Open Energy Info (EERE)

    6AKATransportationOversizeOverweight.pdf Jump to: navigation, search File File history File usage Metadata File:06AKATransportationOversizeOverweight.pdf Size of this preview: 463...

  9. File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    CACCaliforniaEnergyFacilityCPUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf Size of this preview:...

  10. File:03CACEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03CACEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  11. File:06FDAEPAConstructionGeneralPermitConstructionStormwater...

    Open Energy Info (EERE)

    06FDAEPAConstructionGeneralPermitConstructionStormwater.pdf Jump to: navigation, search File File history File usage Metadata File:06FDAEPAConstructionGeneralPermitConstructionStor...

  12. File:07ORDExpeditedPlantCommissioningProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    ORDExpeditedPlantCommissioningProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07ORDExpeditedPlantCommissioningProcess.pdf Size of this preview:...

  13. File:03IDCEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDCEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03IDCEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  14. File:(PECC) Special Program on Climate Change SUMMARY (english...

    Open Energy Info (EERE)

    (PECC) Special Program on Climate Change SUMMARY (english).pdf Jump to: navigation, search File File history File usage File:(PECC) Special Program on Climate Change SUMMARY...

  15. File:0 - Overall Flow - Transmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    - Overall Flow - Transmission.pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow - Transmission.pdf Size of this preview: 463 599...

  16. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual...

  17. File:Federal Hydropower - Southwestern Power Administration.pdf...

    Open Energy Info (EERE)

    Federal Hydropower - Southwestern Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Southwestern Power...

  18. File:Federal Hydropower - Western Area Power Administration.pdf...

    Open Energy Info (EERE)

    Hydropower - Western Area Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Western Area Power Administration.pdf...

  19. File:Texas Construction General Permit (TXR150000).pdf | Open...

    Open Energy Info (EERE)

    Texas Construction General Permit (TXR150000).pdf Jump to: navigation, search File File history File usage Metadata File:Texas Construction General Permit (TXR150000).pdf Size of...

  20. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Rights / Workforce Statistics National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual Report

  1. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    25M NNSA Grant for Nuclear Science and Security Research Working With PNNL Mentors, Engineering Students Deliver Prototype Safeguards Fixtures Shaping the future of nuclear ...

  2. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  3. Nuclear Security 101 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Twenty-eight nations have plans to eliminate all current stocks of HEU by the end of 2013. Upgrading security measures, including physical protection, material control and ...

  4. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Announces 2014 Security Professional of the Year Awards Michael Lempke receives NNSA's Gold Medal of Excellence NNSA's Nevada Field Office Transfers Two Armored Vehicles to FBI...

  5. VIDEO: 2015 By the Numbers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA deputy administrator travels to Ukraine NNSA scientists find more effective ways to detect nuclear explosions near and far NNSA Deputy Administrator Creedon Travels to China

  6. Security Profile Inspector for UNIX Systems

    Energy Science and Technology Software Center (OSTI)

    1995-04-01

    SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configurationmore » Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX system security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less

  7. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Other Executive Positions NNSA seeks highly qualified senior professionals to apply their knowledge, experience and judgment to oversee programs that support NNSA's critical national and nuclear security missions. Our unique compensation systems offer higher entry salaries and faster pay progression to high-performing senior employees, allowing us to attract and retain the best possible senior talent. For browsing current vacancies, please visit NNSA Senior Jobs offsite link . For general

  8. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy Administrator for Defense Nuclear Nonproliferation (DNN), David Huizenga, participated in a ceremony commemorating the transition of a radiation detection system at the Port of Yangshan to the General

  9. File:06COBConstructionStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    Login | Sign Up Search File Edit History File:06COBConstructionStormWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06COBConstructio...

  10. Kansas City National Security Campus | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Operations Acquisition and Project Management M & O Support Department Kansas City National Security Campus Kansas City National Security Campus National Security Campus ...

  11. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments This document ...

  12. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password ...

  13. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  14. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  15. Portable File Format (PFF) specifications.

    SciTech Connect (OSTI)

    Dolan, Daniel H.,

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  16. DOE/ID-Number

    Office of Environmental Management (EM)

    in the energy sector NSTB National SCADA Test Bed Common Cyber Security Vulnerabilities ... of the National Supervisory Control and Data Acquisition (SCADA) Test Bed (NSTB) program. ...

  17. V-008: Debian Security Advisory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply,

  18. Secure computing for the 'Everyman' goes to market

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure computing for the 'Everyman' goes to market Secure computing for the 'Everyman' goes to market Quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer December 22, 2014 Secure computing for the 'Everyman' goes to market This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can

  19. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hopper /scratch file system slow Resolved: Hopper /scratch file system slow August 6, 2014 Symptom: Users have reported scripts hung when involving file copies from/to the /scratch file system, or jobs running in /scratch are slower than before since late last week. Workaround: If it is convenient, move your workflow to /scratch2 temporarily, avoid any reference to /scratch. It includes setting your input files directory, your batch job submission directory, your executable file location, and

  20. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  1. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  2. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  3. FileSystems.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Joint Facilities User Forum on Data- Intensive Computing! June 18, 2014 NERSC File Systems and How to Use Them The compute and storage systems 2014 Produc'on C lusters Carver, P DSF, J GI,KBASE,HEP 1 4x Q DR /global/ scratch 3.6 PB 5 x S FA12KE /project 5 PB DDN9900 & NexSAN /home 250 TB NetApp 5 460 65 PB stored, 240 PB capacity, 4 0 y ears o f community d ata HPSS 16 x Q DR I B 2.2 PB Local Scratch 70 GB/s 6.4 PB Local Scratch 140 GB/s 16 x F DR I B Ethernet & I B F abric Science F

  4. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  5. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NSS Archive National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Archive National Security Science magazine showcases the importance, breadth, and depth of the Laboratory's scientific and technical work that is used to solve key challenges to U.S. national security. NSS April 2016 April 2016 viewer | web | print NSS July 2014 July 2015 viewer | web | print NSS July 2014 December 2014 viewer | web | print NSS July 2014 July 2014 viewer | web

  6. Lemnos Interoperable Security Program

    Energy Savers [EERE]

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  7. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy ... Hydrogen Infrastructure Hydrogen Production Market Transformation Fuel Cells ...

  8. PNNL: Security & Privacy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect

  9. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  10. Security, Safety and Health

    Energy Savers [EERE]

    Security Through Innovation Security Through Innovation December 2, 2014 - 2:28pm Addthis Security, in all forms, can thrive through innovation. With a mission scope that encompasses technology, energy, science, and nuclear security, the Department of Energy (DOE) has been on the forefront of producing ground-breaking solutions to safeguard our nation's precious resources. DOE is working to develop and pioneer the next generation of technology solutions to protect our critical infrastructure.

  11. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  14. PDF File Information (pbl/help)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Help > Help Power Services Site Map Searching for Text Other Navigation Aids PDF File Info Firstgov PDF File Information Many of the documents available on the Power...

  15. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    your input files directory, your batch job submission directory, your executable file location, and the TMPDIR setting (which is set to SCRATCH by default). Status: This...

  16. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the...

  17. Amended Environmental Impact Statement Filing System Guidance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Amended Environmental Impact Statement Filing System Guidance (EPA, 2012) Amended Environmental Impact Statement Filing System Guidance (EPA, 2012) Amended Environmental Impact ...

  18. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  19. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agency through its Office of Research and Development (Interagency Agreement %23 DW8992192801). The material in this document has been subject to technical and policy review by the U.S. EPA, and approved for publication. The views expressed by individual authors, however, are their own, and do not necessarily reflect those of the U.S. Environmental Protection Agency. Mention of trade names, products, or services does not convey official U.S. EPA approval, endorsement, or recommendation. The Water Security Toolkit is an extension of the Threat Ensemble Vulnerability Assessment-Sensor Place- ment Optimization Tool (TEVA-SPOT), which was also developed with funding from the U.S. Environ- mental Protection Agency through its Office of Research and Development (Interagency Agreement %23 DW8992192801). The authors acknowledge the following individuals for their contributions to the devel- opment of TEVA-SPOT: Jonathan Berry (Sandia National Laboratories), Erik Boman (Sandia National Laboratories), Lee Ann Riesen (Sandia National Laboratories), James Uber (University of Cincinnati), and Jean-Paul Watson (Sandia National Laboratories). iii Acronyms ATUS American Time-Use Survey BLAS Basic linear algebra sub-routines CFU Colony-forming unit CVAR Conditional value at risk CWS Contamination warning system EA Evolutionary algorithm EDS Event detection system EPA U.S. Environmental Protection Agency EC Extent of Contamination ERD EPANET results database file GLPK GNU Linear Programming Kit GRASP Greedy randomized adaptive sampling process HEX Hexadecimal HTML HyperText markup language INP EPANET input file LP Linear program MC Mass consumed MILP Mixed integer linear program MIP Mixed integer program MSX Multi-species extension for EPANET NFD Number of failed detections NS Number of sensors NZD Non-zero demand PD Population dosed PE Population exposed PK Population killed TAI Threat assessment input file TCE Tailed-conditioned expectation TD Time to detection TEC Timed extent of contamination TEVA Threat ensemble vulnerability assessment TSB Tryptic soy broth TSG Threat scenario generation file TSI Threat simulation input file VAR Value at risk VC Volume consumed WST Water Security Toolkit YML YAML configuration file format for WST iv Symbols Notation Definition Example %7B , %7D set brackets %7B 1,2,3 %7D means a set containing the values 1,2, and 3. [?] is an element of s [?] S means that s is an element of the set S . [?] for all s = 1 [?] s [?] S means that the statement s = 1 is true for all s in set S . P summation P n i =1 s i means s 1 + s 2 + * * * + s n . %5C set minus S %5C T means the set that contains all those elements of S that are not in set T . %7C given %7C is used to define conditional probability. P ( s %7C t ) means the prob- ability of s occurring given that t occurs. %7C ... %7C cardinality Cardinality of a set is the number of elements of the set. If set S = %7B 2,4,6 %7D , then %7C S %7C = 3. v

  20. Storing files in a parallel computing system using list-based index to identify replica files

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Zhang, Zhenhua; Grider, Gary

    2015-07-21

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value for one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.

  1. Safeguards and Security and Cyber Security RM | Department of Energy

    Energy Savers [EERE]

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. PDF icon Safeguards and Security and Cyber Security RM More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 References, Canceled -7

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, ... Over the past 65 years, the force has changed in size and structure but its mission has... ...

  4. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  5. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    material that it protects. Y-12 is the "Fort Knox" of uranium. We oversee the secure management and storage of strategic and special nuclear materials that have been removed...

  6. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  7. Unix File Groups at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Groups at NERSC Unix File Groups at NERSC Unix file groups are an important component of effective data management, providing a means to control access to shared data on disk and tape. At NERSC, groups are also used to control access to certain computational resources (e.g., batch queues, testbed systems, licensed software). Overview of Unix Groups Every user on a Unix system is a member of one or more Unix groups, including their primary or default group. Every file (or directory) on the system

  8. EnergyPlus File Generator

    Broader source: Energy.gov [DOE]

    EERE EnergyPlus Factsheet - This fact sheet discusses the EnergyPlus Example File Generator, a free, Web-based service which makes it easier to use EnergyPlus, DOE's building energy analysis and thermal load simulation program. The web-based form allows a user to enter general information about a building and the application then automatically creates a complete EnergyPlus input file, runs an annual simulation, and emails the EnergyPlus input, output, DXF and other files along with an annual summary of the energy results.

  9. File:NREL-bhutan-wind.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-bhutan-wind.pdf Jump to: navigation, search File File history File usage Bhutan - 50m Wind Power Size of this preview: 776 600 pixels. Full...

  10. File:NREL-BioMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-BioMap.pdf Jump to: navigation, search File File history File usage Biomass Power Potential (GW) on Federal Lands by County Size of this...

  11. File:NREL-brazil-glo.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-brazil-glo.pdf Jump to: navigation, search File File history File usage Brazil - Annual Global Horizontal Solar Radiation Size of this...

  12. Information Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or NNSA and Department of Energy (DOE) directives. Classified Matter Protection and Control ensures the protection and control of classified matter. It includes briefing and training requirements for personnel who work with classified on identifying, marking, reproducing, protecting, handling, transmitting,

  13. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

  14. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  15. Information Technology Specialist (Information Security) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Information Technology Specialist (Information Security) Information Technology Specialist (Information Security) Submitted by admin on Tue, 2016-05-10 18:01 Job Summary Organization Name Department Of Energy Agency SubElement Department of Energy Locations Oak Ridge, Tennessee Announcement Number DOE-SE-16-ST-00003-DHA Job Summary A successful candidate in this position will serve as an Information Technology Specialist (INFOSEC) responsible for the protection of the information and

  16. Fact #851: December 15, 2014 The Average Number of Gears used in Transmissions Continues to Rise – Dataset

    Broader source: Energy.gov [DOE]

    Excel file with dataset for Fact #851: December 15, 2014 The Average Number of Gears used in Transmissions Continues to Rise

  17. A File System Utilization Metric

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in order to ensure resources are adequately provisioned. Although it is relatively straightforward to- day to measure the total amount of IO to and from a file system, and the...

  18. Guidelines for Filing Monthly Reports

    Office of Energy Efficiency and Renewable Energy (EERE)

    Importers and exporters of natural gas must file monthly reports on their activities, as required in DOE/FE Order No. 2464, dated February 1, 2008.  Reports are required to contain certain...

  19. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  20. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. FIA-16-0020 - In the Matter of the National Security Archive | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 0 - In the Matter of the National Security Archive FIA-16-0020 - In the Matter of the National Security Archive On March 9, 2016, OHA granted in part a FOIA Appeal filed by the National Security Archive (Appellant) from a determination issued to it by the National Nuclear Security Administration (NNSA). In its determination, the NNSA withheld the entirety of a letter written by a former Director of the Los Alamos National Laboratory pursuant to Exemption 1 of the FOIA as well as

  2. PSH-15-0096 In the Matter of Personnel Security Hearing | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 96 In the Matter of Personnel Security Hearing PSH-15-0096 In the Matter of Personnel Security Hearing On February 26, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. During a personnel security interview and a credit report review, the Local Security Office found that the individual had filed a Chapter 13 bankruptcy in 2005 and a Chapter 7 bankruptcy in 2015, and had exhibited a long pattern of

  3. PSH-15-0097 In the Matter of Personnel Security Hearing | Department of

    Office of Environmental Management (EM)

    Energy 6 In the Matter of Personnel Security Hearing PSH-15-0096 In the Matter of Personnel Security Hearing On February 26, 2016, an Administrative Judge issued a decision in which she determined that an individual's access authorization should not be restored. During a personnel security interview and a credit report review, the Local Security Office found that the individual had filed a Chapter 13 bankruptcy in 2005 and a Chapter 7 bankruptcy in 2015, and had exhibited a long pattern of

  4. DOE/ID-Number

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Summary of Control System Security Standards Activities in the Energy Sector October 2005 National SCADA Test Bed A Summary of Control System Security Standards Activities in the Energy Sector October 2005 Sandia National Laboratories Idaho National Laboratory Argonne National Laboratory Pacific Northwest National Laboratory Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability 2 iii ABSTRACT This document is a compilation of the activities and

  5. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Administration labs and sites get girls excited about engineering Wednesday, March 16, 2016 - 1:41pm Future engineers K. Potter, left, and T. Herrin at Y-12 National Security Complex's Introduce a Girl to Engineering event. NNSA workers across the nuclear security enterprise took advantage of "Introduce a girl to engineering day" to instill hundreds of young women with excitement for science, technology, engineering, and math (STEM) careers. This year's theme,

  6. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear weapons and in science for national and global security April 2016 july 2015 The Hurt-Locker School Explosive Results Questing for the Holy Grail of High Explosives Learning from (Near) Disaster A Safer Liftoff Shake, Rattle, and Roll Manhattan Project National Historical Park Strategic Deterrent Forces Charting a

  7. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  8. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA hosts CTBT inspectors at Nevada National Security Site Read more Y-12 honors its inventors for technology transfer Read more Sandia National Laboratories Contract Process Announced Read more NNSA honors two security professionals who protect U.S. nuclear enterprise Read more NNSA lab makes fire tornados to ensure weapon safety Read more Sandia's California site invites community to 60th anniversary Read more CTBT inspectors Tech Transfer Sandia Contract Security awards Fire tornados Sandia

  9. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  10. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced

  11. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  12. Security Forms and Information

    Broader source: Energy.gov [DOE]

    Homeland Security Presidential Directive HSPD-12 established new policy for a common identification standard for Federal Employees and contractors. As of October 27, 2005, all new Federal employees...

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  14. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  15. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  16. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or 1-888-246-2460 using the following timeframes

    using the following timeframes

    //A * ~ w r_ra (b11 II V &. l,4t~Cf..-"i National Nuclear Security Administration DOE/NV--325-Rev. lOa February 2015 Nevada National Security Site Waste Acceptance Criteria Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security Site Waste Acceptance Criteria Disclaimer Notice

  18. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  19. Provision of mobile and man-portable radiation detection equipment;
  20. Regional cooperation on safeguards...

  21. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  22. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  1. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  2. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  3. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  4. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  5. Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... or mentalpersonality disorders, alcohol abuse, use of illegal drugs or the abuse ... in the Human Reliability and Alcohol Abuse Within the Office Secure ...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  7. T-610: Red Hat kdenetwork security update

    Broader source: Energy.gov [DOE]

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  8. Security Council Approval of Kofi

    Energy Savers [EERE]

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation. PDF icon Security Control Assessor Core Competency Training Worksheet More Documents &

  9. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  10. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  11. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  12. Operations Security (OPSEC) Reminder

    Broader source: Energy.gov [DOE]

    DOE O 471.6, Section 4.f, Information Security Manual and the DOE Headquarters Facilities Master Security Plan, Section 8, OPSEC, require that each element review information before it is posted to their publicly accessible website to ensure the data does not contain Controlled Unclassified Information and/or sensitive (critical information).

  13. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  17. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  19. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  20. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  1. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  2. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  3. File:SWERA-247.pdf | Open Energy Information

    Open Energy Info (EERE)

    navigation, search File File history File usage Solar: monthly global horizontal (GHI) GIS data at 40km resolution for Bangladesh from NREL Size of this preview: 776 600...

  4. File:Cubametst 59.pdf | Open Energy Information

    Open Energy Info (EERE)

    59.pdf Jump to: navigation, search File File history File usage Meteorology: map of Cuba selected meteorological stations and elevation from NREL Size of this preview: 776 ...

  5. PIA - Savannah River Operations Office File and Print Services...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    File and Print Services PIA - Savannah River Operations Office File and Print Services PIA - Savannah River Operations Office File and Print Services PDF icon PIA - Savannah River ...

  6. File:PoliticsofFracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Politicso...

  7. File:PerspectiveHealthNatGas.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Perspecti...

  8. File:FrackingFacts.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:FrackingF...

  9. File:INL-geothermal-ca.pdf | Open Energy Information

    Open Energy Info (EERE)

    ca.pdf Jump to: navigation, search File File history File usage California Geothermal Resources Size of this preview: 439 599 pixels. Other resolution: 439 600 pixels. Full...

  10. File:Fut oilp 03.pdf | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search File File history File usage Future Oil Resources and Country Oil Consumption (September 2005) Size of this preview: 800 585 pixels. Full resolution...

  11. File:INL-geothermal-west-usa.pdf | Open Energy Information

    Open Energy Info (EERE)

    INL-geothermal-west-usa.pdf Jump to: navigation, search File File history File usage Western United States Geothermal Resources Size of this preview: 653 599 pixels. Other...

  12. File:Breakout Session Groups.pdf | Open Energy Information

    Open Energy Info (EERE)

    information) File usage The following page links to this file: Energy Data InitiativeResources Retrieved from "http:en.openei.orgwindex.php?titleFile:BreakoutSessionGro...

  13. File:EIA-conventional-gas.pdf | Open Energy Information

    Open Energy Info (EERE)

    conventional-gas.pdf Jump to: navigation, search File File history File usage Natural Gas Production in Conventional Fields, Lower 48 States Size of this preview: 776 600...

  14. File:BrazilTMYst 238.pdf | Open Energy Information

    Open Energy Info (EERE)

    238.pdf Jump to: navigation, search File File history File usage Meteorology: map of Brazil selected meteorological stations and elevation from NREL Size of this preview: 776 ...

  15. File:NREL-brazil-dir.pdf | Open Energy Information

    Open Energy Info (EERE)

    brazil-dir.pdf Jump to: navigation, search File File history File usage Brazil - Annual Direct Normal Solar Radiation Size of this preview: 776 600 pixels. Full resolution...

  16. Nuclear Nonproliferation, International Safeguards and Nuclear Security in

    Office of Scientific and Technical Information (OSTI)

    the Middle East (Conference) | SciTech Connect Conference: Nuclear Nonproliferation, International Safeguards and Nuclear Security in the Middle East Citation Details In-Document Search Title: Nuclear Nonproliferation, International Safeguards and Nuclear Security in the Middle East Authors: Boyer, Brian D [1] + Show Author Affiliations Los Alamos National Laboratory Publication Date: 2012-11-20 OSTI Identifier: 1055251 Report Number(s): LA-UR-12-26430 DOE Contract Number: AC52-06NA25396

  17. Continuous Monitoring And Cyber Security For High Performance Computing

    Office of Scientific and Technical Information (OSTI)

    (Conference) | SciTech Connect Conference: Continuous Monitoring And Cyber Security For High Performance Computing Citation Details In-Document Search Title: Continuous Monitoring And Cyber Security For High Performance Computing Authors: Malin, Alex B. [1] ; Van Heule, Graham K. [1] + Show Author Affiliations Los Alamos National Laboratory Publication Date: 2013-08-02 OSTI Identifier: 1089452 Report Number(s): LA-UR-13-21921 DOE Contract Number: AC52-06NA25396 Resource Type: Conference

  18. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  19. PSH-12-0027 - In the Matter of Personnel Security Hearing | Department of

    Energy Savers [EERE]

    Energy 27 - In the Matter of Personnel Security Hearing PSH-12-0027 - In the Matter of Personnel Security Hearing In October 2011, pursuant to an investigation, the Local Security Office obtained the Individual's credit report. The credit report indicated that the Individual had a number of accounts either in collection or which were charged off. Exhibit (Ex.) 13 at 1-6. Consequently, the DOE facility's Local Security Office (LSO) conducted a personnel security interview (PSI) with the

  20. DOE/NNSA Strategic Performance Evaluation Plan (PEP) FOR Consolidated Nuclear Security, LLC

    National Nuclear Security Administration (NNSA)

    5 DOE/NNSA Strategic Performance Evaluation Plan (PEP) FOR Consolidated Nuclear Security, LLC MANAGEMENT AND OPERATION OF THE Pantex Plant and the Y-12 National Security Complex Contract Number: DE-NA0001942 Performance Period: October 01, 2014 through September 30, 2015 3'5tfr.*>~t Date President and Chief Executive Officer Consolidated Nuclear Security, LLC Date Director, Contracts Consolidated Nuclear Security, LLC FY 2015 Perfonnance Evaluation Plan (PEP) 1 Consolidated Nuclear Security,

  1. PSH-12-0053 - In the Matter of Personnel Security Hearing | Department of

    Office of Environmental Management (EM)

    Energy 7 - In the Matter of Personnel Security Hearing PSH-12-0027 - In the Matter of Personnel Security Hearing In October 2011, pursuant to an investigation, the Local Security Office obtained the Individual's credit report. The credit report indicated that the Individual had a number of accounts either in collection or which were charged off. Exhibit (Ex.) 13 at 1-6. Consequently, the DOE facility's Local Security Office (LSO) conducted a personnel security interview (PSI) with the

  2. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In

  3. File System Licenses in SLURM

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File System Licenses in SLURM Introduction Users can now specify the filesystems required for their jobs by requesting "licenses" for them in their batch scripts. With this new SLURM license feature, a batch job will not start if the specified file system is unavailable due to maintenance or an outage, or if we've detected that it's having performance issues. This will protect your jobs from failures or decreased performance from known issues. We encourage everyone to use the SLURM

  4. Categorical Exclusion Determinations: Health, Safety, and Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Health, Safety, and Security Categorical Exclusion Determinations: Health, Safety, and Security Categorical Exclusion Determinations issued by Health, Safety, and Security. ...

  5. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  6. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  7. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  8. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  9. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  10. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability ... Related Articles U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass ...

  11. Number | Open Energy Information

    Open Energy Info (EERE)

    Property:NumOfPlants Property:NumProdWells Property:NumRepWells Property:Number of Color Cameras Property:Number of Devices Deployed Property:Number of Plants included in...

  12. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  13. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  14. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  15. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  16. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  17. Security Control Assessor | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Control Assessor Security Control Assessor Cyber-security-300x199.jpg The Security Control Assessor (SOA) is responsible for assessing the management, operational, ...

  18. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  19. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  20. Headquarters Facilities Master Security Plan

    Energy Savers [EERE]

    0-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of:  Title 32, CFR, Part 2001, Classified National Security Information  Executive Order 13526, Classified National Security Information  DOE Order 470.4B, Safeguards and Security (S&S) Program, Appendix B. Section 3  DOE Order 475.2A, Identifying Classified Information  DOE Order 475.1, Counterintelligence Program The Security Awareness

  1. Property:File/Author | Open Energy Information

    Open Energy Info (EERE)

    Author Jump to: navigation, search Property Name FileAuthor Property Type String Description Individual that created the original file. Note that this will often not be the same...

  2. Core File Settings | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Settings About Core Files By default, a rank that aborts will dump core, and the control system will signal the other ranks to quit (without dumping core). Multiple core files...

  3. OHA Worker Appeal Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our Worker Appeal decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

  4. EPA to Require Electronic Filing of EISs

    Broader source: Energy.gov [DOE]

    Starting October 1, 2012, all Federal agencies must file their draft and final EISs electronically, pursuant to amended EIS Filing System Guidelines issued by the Environmental Protection Agency (EPA) (77 FR 51530; August 24, 2012).

  5. Help:Uploading Files | Open Energy Information

    Open Energy Info (EERE)

    Uploading Files Jump to: navigation, search Click on the upload file link at the bottom of the page (NOTE: you must be logged in to have this option). Uploading tutorial.JPG Click...

  6. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  7. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information related to the Building Performance Database (BPD) security and software controls. PDF icon Building Performance Database (BPD) Security More Documents & Publications ...

  8. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  9. Safeguards & Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    cyber system operations and security, and business and budget operations including property management. Supports EM headquarters with safeguards and security assistance. ...

  10. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Leadership, Governance Los Alamos National Security, LLC Los Alamos National Security, LLC (LANS) The Lab's mission is to develop and apply science and technology to...

  11. Accomplishments | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ... In FY 2009, ASC released improved codes to support stockpile stewardship and other nuclear security missions, including secure transportation, NSE infrastructure, and nuclear ...

  12. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  13. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  14. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  15. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  16. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    not download the form and save on place it on your hard drive. Proper Completion of Security Termination Statements: When completing Security Termination Statements for submittal...

  17. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  18. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  19. Index of /radsafe/files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    radsafe/files [ICO] Name Last modified Size Description [DIR] Parent Directory - [ ] directions for the radiation detector.doc 23-Jul-1999 00:13 38K [DIR] groundloop/ 13-May-2016 00:26 - [DIR] logs/ 13-May-2016 20:33 - [ ] test.eps 16-Nov-2010 08:28 25K

  20. File:Invitation-English (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    Invitation-English (2).pdf Jump to: navigation, search File File history File usage File:Invitation-English (2).pdf Size of this preview: 321 598 pixels. Other resolution: 322...

  1. File:4003-3 (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    4003-3 (1).pdf Jump to: navigation, search File File history File usage File:4003-3 (1).pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  2. File:3-200-71.pdf | Open Energy Information

    Open Energy Info (EERE)

    3-200-71.pdf Jump to: navigation, search File File history File usage File:3-200-71.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  3. File:3-200-43.pdf | Open Energy Information

    Open Energy Info (EERE)

    3-200-43.pdf Jump to: navigation, search File File history File usage File:3-200-43.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  4. File:09HICHawaiiEISProcess (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    09HICHawaiiEISProcess (1).pdf Jump to: navigation, search File File history File usage File:09HICHawaiiEISProcess (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  5. File:04HIAExplorationPermit (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    4HIAExplorationPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:04HIAExplorationPermit (1).pdf Size of this preview: 463 599 pixels. Other...

  6. File:03CODAccessPermit (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    3CODAccessPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:03CODAccessPermit (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  7. File:05NVBSundryNotice (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    5NVBSundryNotice (2).pdf Jump to: navigation, search File File history File usage Metadata File:05NVBSundryNotice (2).pdf Size of this preview: 463 599 pixels. Other resolution:...

  8. File:DEQ Circular 2.pdf | Open Energy Information

    Open Energy Info (EERE)

    DEQ Circular 2.pdf Jump to: navigation, search File File history File usage File:DEQ Circular 2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  9. File:(131112) Presentacion LAC LEDs.pdf | Open Energy Information

    Open Energy Info (EERE)

    (131112) Presentacion LAC LEDs.pdf Jump to: navigation, search File File history File usage File:(131112) Presentacion LAC LEDs.pdf Size of this preview: 800 600 pixels. Go to...

  10. File:DOD DOI MOU.pdf | Open Energy Information

    Open Energy Info (EERE)

    DOD DOI MOU.pdf Jump to: navigation, search File File history File usage File:DOD DOI MOU.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  11. File:0 - OverallFlow-1.pdf | Open Energy Information

    Open Energy Info (EERE)

    OverallFlow-1.pdf Jump to: navigation, search File File history File usage Metadata File:0 - OverallFlow-1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  12. File:07HICCertificationOfPublicConvenienceAndNecessity.pdf |...

    Open Energy Info (EERE)

    7HICCertificationOfPublicConvenienceAndNecessity.pdf Jump to: navigation, search File File history File usage Metadata File:07HICCertificationOfPublicConvenienceAndNecessity.pdf...

  13. File:03IDDIndustrialLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    03IDDIndustrialLease.pdf Jump to: navigation, search File File history File usage File:03IDDIndustrialLease.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  14. File:07NVCStatePUCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    07NVCStatePUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07NVCStatePUCProcess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  15. File:OperatingPermitCheckList.pdf | Open Energy Information

    Open Energy Info (EERE)

    OperatingPermitCheckList.pdf Jump to: navigation, search File File history File usage File:OperatingPermitCheckList.pdf Size of this preview: 463 599 pixels. Other resolution:...

  16. File:04IDAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04IDAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  17. File:01AKALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    1AKALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01AKALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  18. File:04UTAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    04UTAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04UTAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  19. File:09FDDBLMAppealsProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    9FDDBLMAppealsProcess.pdf Jump to: navigation, search File File history File usage Metadata File:09FDDBLMAppealsProcess.pdf Size of this preview: 463 599 pixels. Other...

  20. File:04TXAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4TXAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04TXAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  1. File:CaveProtectionLaw.pdf | Open Energy Information

    Open Energy Info (EERE)

    CaveProtectionLaw.pdf Jump to: navigation, search File File history File usage Metadata File:CaveProtectionLaw.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  2. File:03IDFLandUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3IDFLandUsePermit.pdf Jump to: navigation, search File File history File usage File:03IDFLandUsePermit.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  3. File:Salt2.pdf | Open Energy Information

    Open Energy Info (EERE)

    Salt2.pdf Jump to: navigation, search File File history File usage Metadata File:Salt2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page...

  4. File:UtilityPermitFranchiseApp.pdf | Open Energy Information

    Open Energy Info (EERE)

    UtilityPermitFranchiseApp.pdf Jump to: navigation, search File File history File usage Metadata File:UtilityPermitFranchiseApp.pdf Size of this preview: 463 599 pixels. Other...

  5. File:2008Guidelines.pdf | Open Energy Information

    Open Energy Info (EERE)

    2008Guidelines.pdf Jump to: navigation, search File File history File usage File:2008Guidelines.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  6. File:AEO2012earlyrelease.pdf | Open Energy Information

    Open Energy Info (EERE)

    AEO2012earlyrelease.pdf Jump to: navigation, search File File history File usage File:AEO2012earlyrelease.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  7. File:08TXATransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    08TXATransmissionSiting.pdf Jump to: navigation, search File File history File usage Metadata File:08TXATransmissionSiting.pdf Size of this preview: 463 599 pixels. Other...

  8. File:04AKCGeothermalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    4AKCGeothermalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKCGeothermalExplorationPermit.pdf Size of this preview: 463 599...

  9. File:Notify98.pdf | Open Energy Information

    Open Energy Info (EERE)

    Notify98.pdf Jump to: navigation, search File File history File usage File:Notify98.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  10. File:06IDCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  11. File:03UTCStateEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTCStateEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03UTCStateEncroachmentOverview.pdf Size of this preview: 463 599 pixels....

  12. File:01HIALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    01HIALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01HIALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  13. File:05AKADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05AKADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  14. File:0708pmtgpres.pdf | Open Energy Information

    Open Energy Info (EERE)

    0708pmtgpres.pdf Jump to: navigation, search File File history File usage File:0708pmtgpres.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  15. File:01ORALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    1ORALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01ORALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  16. File:03TXBLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    TXBLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03TXBLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  17. File:03UTBStateEasementProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    03UTBStateEasementProcess.pdf Jump to: navigation, search File File history File usage Metadata File:03UTBStateEasementProcess.pdf Size of this preview: 463 599 pixels. Other...

  18. File:FormA1.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA1.pdf Jump to: navigation, search File File history File usage File:FormA1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  19. File:Div15.pdf | Open Energy Information

    Open Energy Info (EERE)

    Div15.pdf Jump to: navigation, search File File history File usage File:Div15.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5...

  20. File:03MTCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    03MTCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03MTCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  1. File:03AKELandUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3AKELandUsePermit.pdf Jump to: navigation, search File File history File usage Metadata File:03AKELandUsePermit.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  2. File:06HICDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6HICDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06HICDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  3. File:OilSands.pdf | Open Energy Information

    Open Energy Info (EERE)

    OilSands.pdf Jump to: navigation, search File File history File usage File:OilSands.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  4. File:FormA2.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA2.pdf Jump to: navigation, search File File history File usage File:FormA2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  5. File:06UTATransportation.pdf | Open Energy Information

    Open Energy Info (EERE)

    6UTATransportation.pdf Jump to: navigation, search File File history File usage Metadata File:06UTATransportation.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  6. File:09IDAStateEnvironmentalProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateEnvironmentalProcess.pdf Jump to: navigation, search File File history File usage File:09IDAStateEnvironmentalProcess.pdf Size of this preview: 463 599 pixels. Other...

  7. File:08HIABulkTransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    HIABulkTransmissionSiting.pdf Jump to: navigation, search File File history File usage Metadata File:08HIABulkTransmissionSiting.pdf Size of this preview: 463 599 pixels. Other...

  8. File:08CADPermitToConstruct.pdf | Open Energy Information

    Open Energy Info (EERE)

    CADPermitToConstruct.pdf Jump to: navigation, search File File history File usage Metadata File:08CADPermitToConstruct.pdf Size of this preview: 463 599 pixels. Other...

  9. File:FormA3.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA3.pdf Jump to: navigation, search File File history File usage File:FormA3.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  10. File:VallesGeothermalAreasMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    VallesGeothermalAreasMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesGeothermalAreasMap.pdf Size of this preview: 593 599 pixels. Other...

  11. File:08NVATransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8NVATransmission.pdf Jump to: navigation, search File File history File usage File:08NVATransmission.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  12. File:FormA4.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA4.pdf Jump to: navigation, search File File history File usage File:FormA4.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  13. File:05IDADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    5IDADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05IDADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  14. File:03UTFEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03UTFEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  15. File:03AKDStateNoncompetitiveMineralLeasingProcess.pdf | Open...

    Open Energy Info (EERE)

    3AKDStateNoncompetitiveMineralLeasingProcess.pdf Jump to: navigation, search File File history File usage Metadata File:03AKDStateNoncompetitiveMineralLeasingProcess.pdf Size of...

  16. File:VallesLocationMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    VallesLocationMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesLocationMap.pdf Size of this preview: 800 479 pixels. Full resolution (934...

  17. File:06UTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06UTCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  18. File:App easement pdf.pdf | Open Energy Information

    Open Energy Info (EERE)

    App easement pdf.pdf Jump to: navigation, search File File history File usage File:App easement pdf.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  19. File:471503p.pdf | Open Energy Information

    Open Energy Info (EERE)

    471503p.pdf Jump to: navigation, search File File history File usage File:471503p.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  20. File:EnergyResourcePermittingNV.pdf | Open Energy Information

    Open Energy Info (EERE)

    EnergyResourcePermittingNV.pdf Jump to: navigation, search File File history File usage File:EnergyResourcePermittingNV.pdf Size of this preview: 463 599 pixels. Other...

  1. File:LulApplicationForm.pdf | Open Energy Information

    Open Energy Info (EERE)

    LulApplicationForm.pdf Jump to: navigation, search File File history File usage File:LulApplicationForm.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  2. File:08COAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8COAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08COAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  3. File:303003p.pdf | Open Energy Information

    Open Energy Info (EERE)

    303003p.pdf Jump to: navigation, search File File history File usage File:303003p.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  4. File:03HICEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3HICEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03HICEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  5. File:01WAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1WAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01WAALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  6. File:04FDBExplorationPreApplicationProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    FDBExplorationPreApplicationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04FDBExplorationPreApplicationProcess.pdf Size of this preview: 463...

  7. File:01TXALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1TXALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01TXALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  8. File:06MTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  9. File:1985facilitysitingguide.pdf | Open Energy Information

    Open Energy Info (EERE)

    1985facilitysitingguide.pdf Jump to: navigation, search File File history File usage File:1985facilitysitingguide.pdf Size of this preview: 389 600 pixels. Go to page 1 2 3 4 5...

  10. File:06HIDOtherOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    06HIDOtherOverview.pdf Jump to: navigation, search File File history File usage File:06HIDOtherOverview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  11. File:03FDBTribalLandLeasing.pdf | Open Energy Information

    Open Energy Info (EERE)

    03FDBTribalLandLeasing.pdf Jump to: navigation, search File File history File usage Metadata File:03FDBTribalLandLeasing.pdf Size of this preview: 463 599 pixels. Other...

  12. File:1200Capplicationf.pdf | Open Energy Information

    Open Energy Info (EERE)

    200Capplicationf.pdf Jump to: navigation, search File File history File usage File:1200Capplicationf.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  13. File:WindP.pdf | Open Energy Information

    Open Energy Info (EERE)

    WindP.pdf Jump to: navigation, search File File history File usage Metadata File:WindP.pdf Size of this preview: 466 599 pixels. Other resolution: 467 600 pixels. Go to page...

  14. File:04AKAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4AKAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04AKAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  15. File:03NVBStateLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03NVBStateLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  16. File:08FDCNIETCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    08FDCNIETCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08FDCNIETCProcess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  17. File:06CAATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6CAATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06CAATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  18. File:06NVCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  19. File:06AKCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06AKCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  20. File:06IDATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    06IDATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...