National Library of Energy BETA

Sample records for organizations global security

  1. Energy and Global Security Directorate Organization Chart | Argonne

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Laboratory Energy and Global Security Directorate Organization Chart PDF icon egs_orgchart_07-07-16.pdf

  2. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  5. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  6. Principal Associate Director - Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  7. Office of Global Material Security

    National Nuclear Security Administration (NNSA)

    at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In total, 55 participants from 15 countries and 9 international...

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  10. Global Security 2009

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    523744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch

  11. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  12. Global Security Sciences | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Sciences Advancing world-class science and engineering to protect, mitigate, respond to and recover from threats The Global Security Sciences (GSS) division delivers actionable, defensible and powerful information and technologies to decision makers who impact and shape our global security. Innovative decision support tools (including simulation models), databases and analytical methodologies are developed and used to provide quantitative information to decision makers in the

  13. Cooley joins Y-12's Global Security and Strategic Partnerships...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    globe." Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  14. President Obama Hosts Global Nuclear Security Summit | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) Hosts Global Nuclear Security Summit President Obama Hosts Global Nuclear Security Summit Washington, DC President Obama hosts a Global Nuclear Security Summit to facilitate discussion on the nature of the nuclear threat and develop steps that can be taken together to secure vulnerable materials, combat nuclear smuggling and deter, detect, and disrupt attempts at nuclear terrorism

  15. Global climate change and international security

    SciTech Connect (OSTI)

    Rice, M.

    1991-01-01

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  16. Global climate change and international security.

    SciTech Connect (OSTI)

    Karas, Thomas H.

    2003-11-01

    This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national and international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.

  17. President Obama Hosts Global Nuclear Security Summit | National...

    National Nuclear Security Administration (NNSA)

    President Obama hosts a Global Nuclear Security Summit to facilitate discussion on the nature of the nuclear threat and develop steps that can be taken together to secure...

  18. Facility will focus on bioenergy, global food security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facility will focus on bioenergy, global food security Facility will focus on bioenergy, global food security The New Mexico Consortium expects to complete the 27,000 square foot ...

  19. The Power of One: Energy and Global Security Directorate 2014...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2014 Annual Report Argonne National Laboratory's applied Energy and Global Security (EGS) Directorate pursues unprecedented challenges and opportunities in domestic and global...

  20. Global Security, Medical Isotopes, and Nuclear Science

    SciTech Connect (OSTI)

    Ahle, L E

    2007-09-17

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  1. Global Security, Medical Isotopes, and Nuclear Science

    SciTech Connect (OSTI)

    Ahle, Larry

    2007-10-26

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R and D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  2. William Rees appointed to new Global Security leadership position

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    appointed to new Global Security leadership position A new position that elevates the importance of the Lab's work in key program areas, including non-proliferation,...

  3. NNSA Computers Lead Global List | National Nuclear Security Administra...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Computers Lead Global List | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering...

  4. Office of Global Material Security | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, About This Site Budget IG Web Policy...

  5. Sandia National Laboratories: The Center for Global Security and

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cooperation (CGSC) The Center for Global Security and Cooperation (CGSC) International Programs Building The Center for Global Security and Cooperation (formerly the International Programs Building) is home to the Cooperative Monitoring Center in Albuquerque, New Mexico. Located on the east side of Eubank Boulevard, near the entrance of Kirtland Air Force Base (KAFB), the building houses several well-appointed conference rooms, office space, a specialized library for visiting scholars, and a

  6. Organizing electronic services into security taxonomies - revised

    SciTech Connect (OSTI)

    Smith, S.W.; Pedersen, P.S.

    1997-01-01

    With increasing numbers of commercial and government services being considered for electronic delivery, effective vulnerability analysis will become increasingly critical, Organizing sets of proposed electronic services into security taxonomies will be a key part of this work. However, brute force enumeration of services and risks is inefficient, and ad hoc methods require re-invention with each new set of services. Furthermore, both such approaches fail to communicate effectively the tradeoffs between vulnerabilities and features in a set of electronic services, and fail to scale to large sets of service. From our experience advising players considering electronic delivery, we have developed a general, systematic, and scalable methodology that addresses these concerns. In this paper, we present this methodology, and apply it to the example of electronic services offered via kiosks (since kiosk systems are representative of a wide range of security issues in electronic commerce).

  7. Deputy Secretary Sell Highlights Cooperation in Global Energy Security and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nuclear Non-Proliferation in Moscow | Department of Energy Sell Highlights Cooperation in Global Energy Security and Nuclear Non-Proliferation in Moscow Deputy Secretary Sell Highlights Cooperation in Global Energy Security and Nuclear Non-Proliferation in Moscow March 12, 2007 - 10:28am Addthis Co-Chairs U.S. - Russia Energy Working Group on First Stop on Three Nation Swing MOSCOW, Russia - U.S. Deputy Secretary of Energy Clay Sell today participated in the U.S. - Russia Energy Working

  8. Emerging threats to global security focus of March 12 talk at Bradbury

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Museum Emerging threats to global security talk March 12 Emerging threats to global security focus of March 12 talk at Bradbury Science Museum Terry Wallace will focus on how the Lab will address these issues and help the government respond. March 6, 2014 Terry Wallace, principal associate director for Global Security Terry Wallace, principal associate director for Global Security Contact Steve Sandoval Communications Office (505) 665-9206 Email During the next 20 years, as the

  9. After Globalization Future Security in a Technology Rich World

    SciTech Connect (OSTI)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and important variations of

  10. After globalization future security in a technology rich world

    SciTech Connect (OSTI)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are each described in

  11. Cooley joins Y-12's Global Security and Strategic Partnerships | Y-12

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Complex Cooley joins Y-12's ... Cooley joins Y-12's Global Security and Strategic Partnerships Posted: June 8, 2015 - 5:24pm JIll Cooley comes to Y-12 after a 20-year assignment at the International Atomic Energy Agency in Vienna, Austria Jill Cooley recently joined Y-12 National Security Complex as a senior technical consultant in Global Security and Strategic Partnerships. Cooley comes to Y-12 after a 20-year assignment at the International Atomic Energy Agency in Vienna,

  12. Nuclear Energy Experiments to the Center for Global Security and Cooperation.

    SciTech Connect (OSTI)

    Osborn, Douglas M.

    2015-06-01

    This is to serve as verification that the Center 6200 experimental pieces supplied to the Technology Training and Demonstration Area within the Center of Global Security and Cooperation are indeed unclassified unlimited released for viewing.

  13. Global Survey of the Concepts and Understanding of the Interfaces Between Nuclear Safety, Security, and Safeguards

    SciTech Connect (OSTI)

    Kovacic, Don N.; Stewart, Scott; Erickson, Alexa R.; Ford, Kerrie D.; Mladineo, Stephen V.

    2015-07-15

    There is increasing global discourse on how the elements of nuclear safety, security, and safeguards can be most effectively implemented in nuclear power programs. While each element is separate and unique, they must nevertheless all be addressed in a country’s laws and implemented via regulations and in facility operations. This topic is of particular interest to countries that are currently developing the infrastructure to support nuclear power programs. These countries want to better understand what is required by these elements and how they can manage the interfaces between them and take advantages of any synergies that may exist. They need practical examples and guidance in this area in order to develop better organizational strategies and technical capacities. This could simplify their legal, regulatory, and management structures and avoid inefficient approaches and costly mistakes that may not be apparent to them at this early stage of development. From the perspective of IAEA International Safeguards, supporting Member States in exploring such interfaces and synergies provides a benefit to them because it acknowledges that domestic safeguards in a country do not exist in a vacuum. Instead, it relies on a strong State System of Accounting and Control that is in turn dependent on a capable and independent regulatory body as well as a competent operator and technical staff. These organizations must account for and control nuclear material, communicate effectively, and manage and transmit complete and correct information to the IAEA in a timely manner. This, while in most cases also being responsible for the safety and security of their facilities. Seeking efficiencies in this process benefits international safeguards and nonproliferation. This paper will present the results of a global survey of current and anticipated approaches and practices by countries and organizations with current or future nuclear power programs on how they are implementing, or

  14. Building international genomics collaboration for global health security

    SciTech Connect (OSTI)

    Cui, Helen H.; Erkkila, Tracy; Chain, Patrick S. G.; Vuyisich, Momchilo

    2015-12-07

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installation of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.

  15. Building international genomics collaboration for global health security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Cui, Helen H.; Erkkila, Tracy; Chain, Patrick S. G.; Vuyisich, Momchilo

    2015-12-07

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installationmore » of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.« less

  16. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  17. U.S. national security through global technical engagement presentation to composite group A : homeland and international operations.

    SciTech Connect (OSTI)

    Abeyta, Henry J.

    2010-05-01

    This talk will discuss Sandia's Global Security Program focused on reducing proliferation and terrorism threats to U.S. national security through global technical engagement. Elements include nuclear and radiological risks, biological and chemical risks, and multi-threat risk reduction. Also, recent work addressing the need to better integrate nonproliferation, arms control, counterterrorism, and nuclear deterrent objectives will be discussed.

  18. Global biosurveillance: enabling science and technology. Workshop background and motivation: international scientific engagement for global security

    SciTech Connect (OSTI)

    Cui, Helen H

    2011-01-18

    Through discussion the conference aims to: (1) Identify core components of a comprehensive global biosurveillance capability; (2) Determine the scientific and technical bases to support such a program; (3) Explore the improvement in biosurveillance to enhance regional and global disease outbreak prediction; (4) Recommend an engagement approach to establishing an effective international community and regional or global network; (5) Propose implementation strategies and the measures of effectiveness; and (6) Identify the challenges that must be overcome in the next 3-5 years in order to establish an initial global biosurveillance capability that will have significant positive impact on BioNP as well as public health and/or agriculture. There is also a look back at the First Biothreat Nonproliferation Conference from December 2007. Whereas the first conference was an opportunity for problem solving to enhance and identify new paradigms for biothreat nonproliferation, this conference is moving towards integrated comprehensive global biosurveillance. Main reasons for global biosurveillance are: (1) Rapid assessment of unusual disease outbreak; (2) Early warning of emerging, re-emerging and engineered biothreat enabling reduced morbidity and mortality; (3) Enhanced crop and livestock management; (4) Increase understanding of host-pathogen interactions and epidemiology; (5) Enhanced international transparency for infectious disease research supporting BWC goals; and (6) Greater sharing of technology and knowledge to improve global health.

  19. Organization Chart | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organization Chart Download Other Organization Charts Computing, Environment, and Life Sciences Energy and Global Security Physical Science and Engineering Photon Sciences PDF icon argonne_org_chart

  20. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  1. Global environmental security: Research and policy strategies for the 1990s

    SciTech Connect (OSTI)

    Lazaro, M.A.; Wang, Hua

    1992-09-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  2. Global environmental security: Research and policy strategies for the 1990s

    SciTech Connect (OSTI)

    Lazaro, M.A.; Wang, Hua.

    1992-01-01

    The subject of global environmental change is emerging as one of the most hotly debated international issues for the 1990s. In fact, our earth system has undergone a nature-induced gradual change in climate on both a temporal scale that spans over millions of years and a spatial scale ranging from regional to transcontinental. Pollutant emissions associated with population growth and industrial activities manifest the anthropogenic climatic forcing that has been superimposed on the background of natural climate fluctuations. Our incomplete understanding of the global impacts of environmental pollution on the earth systems (atmosphere, biosphere, hydrosphere, cryosphere, and lithosphere), however, make the prediction of the timing, magnitude, and patterns of future global change uncertain. This paper examines the science and policy background of global environmental change. The major scientific uncertainties and policy issues confronting decision makers are identified; and the scientific framework, as well as current national and international research programs aimed at resolving the scientific uncertainties, are discussed. A coherent, stable, and flexible policy is needed to provide a foundation for coordinated international-interagency programs of observation, research, analysis, and international negotiation toward a policy consensus concerning global environmental security. On the basis of what is currently known about global change, recommendations are presented on both near-term and long-term policy option decisions.

  3. The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract

  4. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  5. Global partnering related to nuclear materials safeguards and security - A pragmatic approach to international safeguards work

    SciTech Connect (OSTI)

    Stanford, Dennis

    2007-07-01

    This paper documents issues Nuclear Fuel Services, Inc. has addressed in the performance of international work to safeguards and security work. It begins with a description of the package we put together for a sample proposal for the Global Threat Reduction Initiative, for which we were ranked number one for technical approach and cost, and concludes with a discussion of approaches that we have taken to performing this work, including issues related to performing the work as part of a team. The primary focus is on communication, workforce, equipment, and coordination issues. Finally, the paper documents the rules that we use to assure the work is performed safely and successfully. (author)

  6. Lab Organizations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations Lab Organizations National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Los Alamos National Security, LLC Leadership Team Organization Chart PRINCIPAL ASSOCIATE DIRECTORATES Capital Projects, Larry Simmons Global Security, Terry Wallace Operations and Business, Craig Leasure Science, Technology, and Engineering, Alan Bishop

  7. Global climate change and international security. Report on a conference held at Argonne National Laboratory, May 8--10, 1991

    SciTech Connect (OSTI)

    Rice, M.

    1991-12-31

    On May 8--10, 1991, the Midwest Consortium of International Security Studies (MCISS) and Argonne National Laboratory cosponsored a conference on Global Climate Change and International Security. The aim was to bring together natural and social scientists to examine the economic, sociopolitical, and security implications of the climate changes predicted by the general circulation models developed by natural scientists. Five themes emerged from the papers and discussions: (1) general circulation models and predicted climate change; (2) the effects of climate change on agriculture, especially in the Third World; (3) economic implications of policies to reduce greenhouse gas emissions; (4) the sociopolitical consequences of climate change; and (5) the effect of climate change on global security.

  8. How America can look within to achieve energy security and reduce global warming.

    SciTech Connect (OSTI)

    Richter, B.; Goldston, D.; Crabtree, G.; Glicksman, L.; Goldstein, D.; Greene, D.; Kammen, D.; Levin, M.; Lubell, M.; Savitz, M.; Sperling, D.; Schlachter, F.; Scofield, J.; Dawson, J.

    2008-12-01

    Making major gains in energy efficiency is one of the most economical and effective ways our nation can wean itself off its dependence on foreign oil and reduce its emissions of greenhouse gases. Transportation and buildings, which account for two thirds of American energy usage, consume far more than they need to, but even though there are many affordable energy efficient technologies that can save consumers money, market imperfections inhibit their adoption. To overcome the barriers, the federal government must adopt policies that will transform the investments into economic and societal benefit. And the federal government must invest in research and development programs that target energy efficiency. Energy efficiency is one of America's great hidden energy reserves. We should begin tapping it now. Whether you want the United States to achieve greater energy security by weaning itself off foreign oil, sustain strong economic growth in the face of worldwide competition or reduce global warming by decreasing carbon emissions, energy efficiency is where you need to start. Thirty-five years ago the U.S. adopted national strategies, implemented policies and developed technologies that significantly improved energy efficiency. More than three decades have passed since then, and science and technology have progressed considerably, but U.S. energy policy has not. It is time to revisit the issue. In this report we examine the scientific and technological opportunities and policy actions that can make the United States more energy efficient, increase its security and reduce its impact on global warming. We believe the findings and recommendations will help Congress and the next administration to realize these goals. Our focus is on the transportation and buildings sectors of the economy. The opportunities are huge and the costs are small.

  9. Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Permalink EC, DHS's S&T Directorate, Federal Emergency Management Agency: SUMMIT Analysis, Capabilities, Facilities, Global, Infrastructure Security, Modeling, Modeling & Analysis, NISAC, Partnership, Research & Capabilities EC, DHS's S&T Directorate, Federal Emergency Management Agency: SUMMIT Natural disasters create emergency situations that must be dealt with quickly and effectively in order to minimize injury and loss of life. Simulating such events before they occur can

  10. Weapons proliferation and organized crime: The Russian military and security force dimension

    SciTech Connect (OSTI)

    Turbiville, G.H.

    1996-06-01

    One dimension of international security of the post-Cold War era that has not received enough attention is how organized crime facilitates weapons proliferation worldwide. The former Soviet Union (FSU) has emerged as the world`s greatest counterproliferation challenge. It contains the best developed links among organized crime, military and security organizations, and weapons proliferation. Furthermore, Russian military and security forces are the principle source of arms becoming available to organized crime groups, participants in regional conflict, and corrupt state officials engaged in the black, gray, and legal arms markets in their various dimensions. The flourishing illegal trade in conventional weapons is the clearest and most tangible manifestation of the close links between Russian power ministries and criminal organizations. The magnitude of the WMD proliferation problem from the FSU is less clear and less tangible. There have been many open reports of small-scale fissile material smuggling out of the FSU. The situation with regard to the proliferation of chemical weapon usually receives less attention but may be more serious. With an acknowledged stockpile of 40,000 metric tons of chemical agents, the potential for proliferation is enormous.

  11. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  12. Estimation of organ and effective dose due to Compton backscatter security scans

    SciTech Connect (OSTI)

    Hoppe, Michael E.; Schmidt, Taly Gilat

    2012-06-15

    Purpose: To estimate organ and effective radiation doses due to backscatter security scanners using Monte Carlo simulations and a voxelized phantom set. Methods: Voxelized phantoms of male and female adults and children were used with the GEANT4 toolkit to simulate a backscatter security scan. The backscatter system was modeled based on specifications available in the literature. The simulations modeled a 50 kVp spectrum with 1.0 mm-aluminum-equivalent filtration and a previously measured exposure of approximately 4.6 {mu}R at 30 cm from the source. Photons and secondary interactions were tracked from the source until they reached zero kinetic energy or exited from the simulation's boundaries. The energy deposited in the phantoms' respective organs was tallied and used to calculate total organ dose and total effective dose for frontal, rear, and full scans with subjects located 30 and 75 cm from the source. Results: For a full screen, all phantoms' total effective doses were below the established 0.25 {mu}Sv standard, with an estimated maximum total effective dose of 0.07 {mu}Sv for full screen of a male child. The estimated maximum organ dose due to a full screen was 1.03 {mu}Gy, deposited in the adipose tissue of the male child phantom when located 30 cm from the source. All organ dose estimates had a coefficient of variation of less than 3% for a frontal scan and less than 11% for a rear scan. Conclusions: Backscatter security scanners deposit dose in organs beyond the skin. The effective dose is below recommended standards set by the Health Physics Society (HPS) and the American National Standards Institute (ANSI) assuming the system provides a maximum exposure of approximately 4.6 {mu}R at 30 cm.

  13. Fact Sheet: U.S-Turkey Cooperation in Global Energy Security...

    Office of Environmental Management (EM)

    Turkey with its energy security, as Turkey is a key component of a larger regional strategy for increased energy production and diversification of oil and gas transit routes. ...

  14. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    SciTech Connect (OSTI)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad; Pshakin, Gennady

    2015-02-23

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fully integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may

  15. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  16. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  17. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  18. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  19. Research and Development | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nonproliferation Research and Development The mission of the Office of Research and Development (R&D) is to support U.S. national and nuclear security objectives in reducing global nuclear security threats through the innovation of unilateral and multi-lateral technical capabilities to detect, identify, and characterize: 1) foreign nuclear weapons programs, 2) illicit diversion of special nuclear materials, and 3) global nuclear detonations. R&D is organized into two offices:

  20. Global distribution and surface activity of macromolecules in offline simulations of marine organic chemistry

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ogunro, Oluwaseun O.; Burrows, Susannah M.; Elliott, Scott; Frossard, Amanda A.; Hoffman, Forrest M.; Letscher, Robert T.; Moore, J. Keith; Russell, Lynn M.; Wang, Shanlin; Wingenter, Oliver W.

    2015-10-13

    Here, organic macromolecules constitute high percentage components of remote sea spray. They enter the atmosphere through adsorption onto bubbles followed by bursting at the ocean surface, and go on to influence the chemistry of the fine mode aerosol. We present a global estimate of mixed-layer organic macromolecular distributions, driven by offline marine systems model output. The approach permits estimation of oceanic concentrations and bubble film surface coverages for several classes of organic compound. Mixed layer levels are computed from the output of a global ocean biogeochemistry model by relating the macromolecules to standard biogeochemical tracers. Steady state is assumed formore » labile forms, and for longer-lived components we rely on ratios to existing transported variables. Adsorption is then represented through conventional Langmuir isotherms, with equilibria deduced from laboratory analogs. Open water concentrations locally exceed one micromolar carbon for the total of protein, polysaccharide and refractory heteropolycondensate. The shorter-lived lipids remain confined to regions of strong biological activity. Results are evaluated against available measurements for all compound types, and agreement is generally quite reasonable. Global distributions are further estimated for both fractional coverage of bubble films at the air-water interface and the two-dimensional concentration excess. Overall, we show that macromolecular mapping provides a novel tool for the comprehension of oceanic surfactant distributions. Results may prove useful in planning field experiments and assessing the potential response of surface chemical behaviors to global change.« less

  1. Global distribution and surface activity of macromolecules in offline simulations of marine organic chemistry

    SciTech Connect (OSTI)

    Ogunro, Oluwaseun O.; Burrows, Susannah M.; Elliott, Scott; Frossard, Amanda A.; Hoffman, Forrest M.; Letscher, Robert T.; Moore, J. Keith; Russell, Lynn M.; Wang, Shanlin; Wingenter, Oliver W.

    2015-10-13

    Here, organic macromolecules constitute high percentage components of remote sea spray. They enter the atmosphere through adsorption onto bubbles followed by bursting at the ocean surface, and go on to influence the chemistry of the fine mode aerosol. We present a global estimate of mixed-layer organic macromolecular distributions, driven by offline marine systems model output. The approach permits estimation of oceanic concentrations and bubble film surface coverages for several classes of organic compound. Mixed layer levels are computed from the output of a global ocean biogeochemistry model by relating the macromolecules to standard biogeochemical tracers. Steady state is assumed for labile forms, and for longer-lived components we rely on ratios to existing transported variables. Adsorption is then represented through conventional Langmuir isotherms, with equilibria deduced from laboratory analogs. Open water concentrations locally exceed one micromolar carbon for the total of protein, polysaccharide and refractory heteropolycondensate. The shorter-lived lipids remain confined to regions of strong biological activity. Results are evaluated against available measurements for all compound types, and agreement is generally quite reasonable. Global distributions are further estimated for both fractional coverage of bubble films at the air-water interface and the two-dimensional concentration excess. Overall, we show that macromolecular mapping provides a novel tool for the comprehension of oceanic surfactant distributions. Results may prove useful in planning field experiments and assessing the potential response of surface chemical behaviors to global change.

  2. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  3. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  4. Global distribution and climate forcing of marine organic aerosol: 1. Model improvements and evaluation

    SciTech Connect (OSTI)

    Meskhidze, N.; Xu, J.; Gantt, Brett; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

    2011-11-23

    Marine organic aerosol emissions have been implemented and evaluated within the National Center of Atmospheric Research (NCAR)'s Community Atmosphere Model (CAM5) with the Pacific Northwest National Laboratory's 7-mode Modal Aerosol Module (MAM-7). Emissions of marine primary organic aerosols (POA), phytoplanktonproduced isoprene- and monoterpenes-derived secondary organic aerosols (SOA) and methane sulfonate (MS{sup -}) are shown to affect surface concentrations of organic aerosols in remote marine regions. Global emissions of submicron marine POA is estimated to be 7.9 and 9.4 Tg yr{sup -1}, for the Gantt et al. (2011) and Vignati et al. (2010) emission parameterizations, respectively. Marine sources of SOA and particulate MS{sup -} (containing both sulfur and carbon atoms) contribute an additional 0.2 and 5.1 Tg yr{sup -1}, respectively. Widespread areas over productive waters of the Northern Atlantic, Northern Pacific, and the Southern Ocean show marine-source submicron organic aerosol surface concentrations of 100 ngm{sup -3}, with values up to 400 ngm{sup -3} over biologically productive areas. Comparison of long-term surface observations of water insoluble organic matter (WIOM) with POA concentrations from the two emission parameterizations shows that despite revealed discrepancies (often more than a factor of 2), both Gantt et al. (2011) and Vignati et al. (2010) formulations are able to capture the magnitude of marine organic aerosol concentrations, with the Gantt et al. (2011) parameterization attaining better seasonality. Model simulations show that the mixing state of the marine POA can impact the surface number concentration of cloud condensation nuclei (CCN). The largest increases (up to 20 %) in CCN (at a supersaturation (S) of 0.2 %) number concentration are obtained over biologically productive ocean waters when marine organic aerosol is assumed to be externally mixed with sea-salt. Assuming marine organics are internally-mixed with sea

  5. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    SciTech Connect (OSTI)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  6. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  7. Global Security 2009

    Office of Environmental Management (EM)

    Communication Posts on Internal social network Personal emails from managers to ... Communication Posts on Internal social network Personal emails from IT managers ...

  8. Strengthening Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The Laboratory was established in 1943 as part of the Manhattan Project, the nation's top-secret program to develop the atomic bomb. Since 1943, the Laboratory has strengthened our ...

  9. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  10. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  11. Particle Energization via Tearing Instability with Global Self-Organization Constraints

    SciTech Connect (OSTI)

    Sarff, John; Guo, Fan

    2015-07-21

    The presentation reviews how tearing magnetic reconnection leads to powerful ion energization in reversed field pinch (RFP) plasmas. A mature MHD model for tearing instability has been developed that captures key nonlinear dynamics from the global to intermediate spatial scales. A turbulent cascade is also present that extends to at least the ion gyroradius scale, within which important particle energization mechanisms are anticipated. In summary, Ion heating and acceleration associated with magnetic reconnection from tearing instability is a powerful process in the RFP laboratory plasma (gyro-resonant and stochastic processes are likely candidates to support the observed rapid heating and other features, reconnection-driven electron heating appears weaker or even absent, energetic tail formation for ions and electrons). Global self-organization strongly impacts particle energization (tearing interactions that span to core to edge, global magnetic flux change produces a larger electric field and runaway, correlations in electric and magnetic field fluctuations needed for dynamo feedback, impact of transport processes (which can be quite different for ions and electrons), inhomogeneity on the system scale, e.g., strong edge gradients).

  12. Sandia National Laboratories: National Security Missions: International

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland and Nuclear Security: Global Security Global Security Global Security Image We develop technologies to enhance the security of nuclear weapons and materials worldwide. We support negotiations and implementation of international treaties and agreements. We provide guidance to the global community on effective security practices for dangerous materials. We are committed to developing partnerships to build a global capacity to prevent the misuse of nuclear, chemical, biological and

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  14. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  15. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  16. The AeroCom evaluation and intercomparison of organic aerosol in global models

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Tsigaridis, K.; Daskalakis, N.; Kanakidou, M.; Adams, P. J.; Artaxo, P.; Bahadur, R.; Balkanski, Y.; Bauer, S. E.; Bellouin, N.; Benedetti, A.; et al

    2014-10-15

    This paper evaluates the current status of global modeling of the organic aerosol (OA) in the troposphere and analyzes the differences between models as well as between models and observations. Thirty-one global chemistry transport models (CTMs) and general circulation models (GCMs) have participated in this intercomparison, in the framework of AeroCom phase II. The simulation of OA varies greatly between models in terms of the magnitude of primary emissions, secondary OA (SOA) formation, the number of OA species used (2 to 62), the complexity of OA parameterizations (gas-particle partitioning, chemical aging, multiphase chemistry, aerosol microphysics), and the OA physical, chemicalmore » and optical properties. The diversity of the global OA simulation results has increased since earlier AeroCom experiments, mainly due to the increasing complexity of the SOA parameterization in models, and the implementation of new, highly uncertain, OA sources. Diversity of over one order of magnitude exists in the modeled vertical distribution of OA concentrations that deserves a dedicated future study. Furthermore, although the OA / OC ratio depends on OA sources and atmospheric processing, and is important for model evaluation against OA and OC observations, it is resolved only by a few global models. The median global primary OA (POA) source strength is 56 Tg a–1 (range 34–144 Tg a−1) and the median SOA source strength (natural and anthropogenic) is 19 Tg a–1 (range 13–121 Tg a−1). Among the models that take into account the semi-volatile SOA nature, the median source is calculated to be 51 Tg a–1 (range 16–121 Tg a−1), much larger than the median value of the models that calculate SOA in a more simplistic way (19 Tg a–1; range 13–20 Tg a–1, with one model at 37 Tg a−1). The median atmospheric burden of OA is 1.4 Tg (24 models in the range of 0.6–2.0 Tg and 4 between 2.0 and 3.8 Tg), with a median OA lifetime of 5.4 days (range 3.8–9.6 days

  17. Technology Applications Center | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Y-12 TAC? Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  18. Product Return Liaison | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    us. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Central Scrap Management...

  19. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  20. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions

    SciTech Connect (OSTI)

    Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

    2009-07-01

    The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

  2. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA deputy administrator travels to Ukraine NNSA scientists find more effective ways to detect nuclear explosions near and far NNSA Deputy Administrator Creedon Travels to China

  3. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    PNNL researchers with nonproliferation and international safeguards work NNSA Researchers Advance Technology for Remote Reactor Monitoring Ambassador Ensher visits Y-12 and NNSS

  4. Sandia National Laboratories: Partnerships for Global Technical Engagement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Partnerships for Global Technical Engagement Cooperative Technical Solutions to Global Security Challenges Sandia engages whenever possible in activities that are completely transparent and focused on cooperative efforts that constitute a partnership. We partner with universities and institutes, with non-governmental organizations (NGOs), and with government agencies in other countries. These partnerships help us implement collaborative projects, establish ties with technical experts in other

  5. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  6. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  7. National Nuclear Security Administration/Nevada Field Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    News Media Contact: For Immediate Release: Dante Pistone, 702/295-6021 June 6, 2016 pistondc@nv.doe.gov NSTec President Holt Appointed to LVGEA Board LAS VEGAS - Jim Holt, president of National Security Technologies LLC (NSTec), has been named to the Board of Directors of the Las Vegas Global Economic Alliance (LVGEA), the leading economic development organization in southern Nevada. NSTec is the managing and operating contractor for the Nevada National Security Site (NNSS), under the auspices

  8. Achieving the Vision of the global nuclear energy partnership - greater energy security in a safer, cleaner world

    SciTech Connect (OSTI)

    Golub, S.J.; Frazier, T.A.

    2007-07-01

    This paper describes the strategy that the U.S. Department of Energy (DOE) is pursuing to transform the vision of the Global Nuclear Energy Partnership (GNEP) into reality. GNEP will promote the use of clean, safe nuclear power through the use of advanced reactors and new methods to recycle spent nuclear fuel. By shifting from a once through fuel cycle to a closed fuel cycle, we can extract more energy from the nuclear fuel and dramatically reduce the amount of nuclear waste. By incorporating enhanced safeguards and material accountability we can further reduce the risk of nuclear proliferation. While the benefits of achieving this vision are clearly profound, based on the sheer scope and magnitude of the GNEP, there will undoubtedly be challenges along the way. This endeavor will require careful planning and effective management to assure our long-term success. Moving forward, GNEP will be thoroughly engaged with our stakeholder community. By effectively leveraging the talents of DOE, the National Laboratories, Universities, private industry, the regulatory community and our international partners these challenges will become opportunities for success. (authors)

  9. Global Distribution and Climate Forcing of Marine Organic Aerosol - Part 2: Effects on Cloud Properties and Radiative Forcing

    SciTech Connect (OSTI)

    Gantt, Brett; Xu, Jun; Meskhidze, N.; Zhang, Yang; Nenes, Athanasios; Ghan, Steven J.; Liu, Xiaohong; Easter, Richard C.; Zaveri, Rahul A.

    2012-07-25

    A series of simulations with the Community Atmosphere Model version 5 (CAM5) with a 7-mode Modal Aerosol Model were conducted to assess the changes in cloud microphysical properties and radiative forcing resulting from marine organic aerosols. Model simulations show that the anthropogenic aerosol indirect forcing (AIF) predicted by CAM5 is decreased in absolute magnitude by up to 0.09 Wm{sup -2} (7 %) when marine organic aerosols are included. Changes in the AIF from marine organic aerosols are associated with small global increases in low-level incloud droplet number concentration and liquid water path of 1.3 cm{sup -3} (1.5 %) and 0.22 gm{sup -2} (0.5 %), respectively. Areas especially sensitive to changes in cloud properties due to marine organic aerosol include the Southern Ocean, North Pacific Ocean, and North Atlantic Ocean, all of which are characterized by high marine organic emission rates. As climate models are particularly sensitive to the background aerosol concentration, this small but non-negligible change in the AIF due to marine organic aerosols provides a notable link for ocean-ecosystem marine low-level cloud interactions and may be a candidate for consideration in future earth system models.

  10. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  11. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  12. Fluidized Bed Steam Reforming (FBSR) Mineralization for High Organic and Nitrate Waste Streams for the Global Nuclear Energy Partnership (GNEP)

    SciTech Connect (OSTI)

    Jantzen, C.M.; Williams, M.R. [Savannah River National Laboratory, Aiken, SC (United States)

    2008-07-01

    Waste streams that may be generated by the Global Nuclear Energy Partnership (GNEP) Advanced Energy Initiative may contain significant quantities of organics (0-53 wt%) and/or nitrates (0-56 wt%). Decomposition of high nitrate streams requires reducing conditions, e.g. organic additives such as sugar or coal, to reduce the NOx in the off-gas to N{sub 2} to meet the Clean Air Act (CAA) standards during processing. Thus, organics will be present during waste form stabilization regardless of which GNEP processes are chosen, e.g. organics in the feed or organics for nitrate destruction. High organic containing wastes cannot be stabilized with the existing HLW Best Developed Available Technology (BDAT) which is HLW vitrification (HLVIT) unless the organics are removed by preprocessing. Alternative waste stabilization processes such as Fluidized Bed Steam Reforming (FBSR) operate at moderate temperatures (650-750 deg. C) compared to vitrification (1150-1300 deg. C). FBSR converts organics to CAA compliant gases, creates no secondary liquid waste streams, and creates a stable mineral waste form that is as durable as glass. For application to the high Cs-137 and Sr-90 containing GNEP waste streams a single phase mineralized Cs-mica phase was made by co-reacting illite clay and GNEP simulated waste. The Cs-mica accommodates up to 30% wt% Cs{sub 2}O and all the GNEP waste species, Ba, Sr, Rb including the Cs-137 transmutation to Ba-137. For reference, the cesium mineral pollucite (CsAlSi{sub 2}O{sub 6}), currently being studied for GNEP applications, can only be fabricated at {>=}1000 deg. C. Pollucite mineralization creates secondary aqueous waste streams and NOx. Pollucite is not tolerant of high concentrations of Ba, Sr or Rb and forces the divalent species into different mineral host phases. The pollucite can accommodate up to 33% wt% Cs{sub 2}O. (authors)

  13. FLUIDIZED BED STEAM REFORMING MINERALIZATION FOR HIGH ORGANIC AND NITRATE WASTE STREAMS FOR THE GLOBAL NUCLEAR ENERGY PARTNERSHIP

    SciTech Connect (OSTI)

    Jantzen, C; Michael Williams, M

    2008-01-11

    Waste streams that may be generated by the Global Nuclear Energy Partnership (GNEP) Advanced Energy Initiative may contain significant quantities of organics (0-53 wt%) and/or nitrates (0-56 wt%). Decomposition of high nitrate streams requires reducing conditions, e.g. organic additives such as sugar or coal, to reduce the NO{sub x} in the off-gas to N{sub 2} to meet the Clean Air Act (CAA) standards during processing. Thus, organics will be present during waste form stabilization regardless of which GNEP processes are chosen, e.g. organics in the feed or organics for nitrate destruction. High organic containing wastes cannot be stabilized with the existing HLW Best Developed Available Technology (BDAT) which is HLW vitrification (HLVIT) unless the organics are removed by preprocessing. Alternative waste stabilization processes such as Fluidized Bed Steam Reforming (FBSR) operate at moderate temperatures (650-750 C) compared to vitrification (1150-1300 C). FBSR converts organics to CAA compliant gases, creates no secondary liquid waste streams, and creates a stable mineral waste form that is as durable as glass. For application to the high Cs-137 and Sr-90 containing GNEP waste streams a single phase mineralized Cs-mica phase was made by co-reacting illite clay and GNEP simulated waste. The Cs-mica accommodates up to 30% wt% Cs{sub 2}O and all the GNEP waste species, Ba, Sr, Rb including the Cs-137 transmutation to Ba-137. For reference, the cesium mineral pollucite (CsAlSi{sub 2}O{sub 6}), currently being studied for GNEP applications, can only be fabricated at {ge} 1000 C. Pollucite mineralization creates secondary aqueous waste streams and NO{sub x}. Pollucite is not tolerant of high concentrations of Ba, Sr or Rb and forces the divalent species into different mineral host phases. The pollucite can accommodate up to 33% wt% Cs{sub 2}O.

  14. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy(...

  15. Global Climate Models

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Climate & Earth Systems Climate Measurement & Modeling Arctic Climate Measurements Global ...

  16. Global Climate & Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Team Attends World Water Week in Stockholm Climate, Energy, Global Climate & Energy, Modeling, Modeling & Analysis, News, News & Events, Water Security Sandia Team Attends World ...

  17. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  18. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  19. Global Scratch Gets an Upgrade

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NNSA) Nonproliferation Global Material Security The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, as well as to build capacity to deter, detect and interdict the illicit trafficking of such materials. GMS achieves its mission through three subprograms: International Nuclear Security Radiological Security Nuclear Smuggling Detection and Deterrence (formerly

  20. Security for Radioactive Sources: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  1. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  2. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    gms NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  3. Before House Subcommittee on Africa, Global Health, Global Human Rights,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and International Organizations, Committee on Foreign Affairs | Department of Energy House Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, Committee on Foreign Affairs Before House Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, Committee on Foreign Affairs Testimony of Jonathan Elkind, Acting Assistant Secretary, Office of International Affairs Before House Subcommittee on Africa, Global Health, Global

  4. Effect of Terrestrial and Marine Organic Aerosol on Regional and Global Climate: Model Development, Application, and Verification with Satellite Data

    SciTech Connect (OSTI)

    Meskhidze, Nicholas; Zhang, Yang; Kamykowski, Daniel

    2012-03-28

    In this DOE project the improvements to parameterization of marine primary organic matter (POM) emissions, hygroscopic properties of marine POM, marine isoprene derived secondary organic aerosol (SOA) emissions, surfactant effects, new cloud droplet activation parameterization have been implemented into Community Atmosphere Model (CAM 5.0), with a seven mode aerosol module from the Pacific Northwest National Laboratory (PNNL)'s Modal Aerosol Model (MAM7). The effects of marine aerosols derived from sea spray and ocean emitted biogenic volatile organic compounds (BVOCs) on microphysical properties of clouds were explored by conducting 10 year CAM5.0-MAM7 model simulations at a grid resolution 1.9° by 2.5° with 30 vertical layers. Model-predicted relationship between ocean physical and biological systems and the abundance of CCN in remote marine atmosphere was compared to data from the A-Train satellites (MODIS, CALIPSO, AMSR-E). Model simulations show that on average, primary and secondary organic aerosol emissions from the ocean can yield up to 20% increase in Cloud Condensation Nuclei (CCN) at 0.2% Supersaturation, and up to 5% increases in droplet number concentration of global maritime shallow clouds. Marine organics were treated as internally or externally mixed with sea salt. Changes associated with cloud properties reduced (absolute value) the model-predicted short wave cloud forcing from -1.35 Wm-2 to -0.25 Wm-2. By using different emission scenarios, and droplet activation parameterizations, this study suggests that addition of marine primary aerosols and biologically generated reactive gases makes an important difference in radiative forcing assessments. All baseline and sensitivity simulations for 2001 and 2050 using global-through-urban WRF/Chem (GU-WRF) were completed. The main objective of these simulations was to evaluate the capability of GU-WRF for an accurate representation of the global atmosphere by exploring the most accurate configuration of

  5. treaty verification | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    treaty verification Global Material Security The mission of the Office of Global Material Security (GMS) is to help partner countries secure and account for nuclear weapons, weapons-useable nuclear and radiological materials, as well as to build capacity to deter, detect and interdict the illicit trafficking of such materials. GMS achieves

  6. System and method for secure group transactions

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  7. maritime supply chain | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    maritime supply chain NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  8. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    200 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 7, 2010 Employee volunteer efforts to be recognized LOS ALAMOS, New Mexico, June 7, 2010-Nonprofit organizations are receiving more than $117,000 from Los Alamos National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits as a result of the volunteer efforts of Los Alamos National

  9. Y-12 National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Campus Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  10. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  11. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  12. research and development | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    research and development NNSA Administrator honors nonproliferation research leader Last week DOE Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) presented the agency's Assistant Deputy Administrator for Nonproliferation Research and Development (R&D) Dr. Rhys Williams with the Distinguished Service Gold Medal Award at a... Global Material Security The mission of the Office of Global Material Security (GMS) is to help partner countries secure and

  13. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  14. Sandia National Laboratories: National Security Missions: International

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland and Nuclear Security Programs International, Homeland, & Nuclear Security Reducing cyber threats Tools and techniques to improve cyber defense and protect networks and data Reducing global chemical and biological dangers Technologies for rapid detection and characterization of chemical and biological threats Reducing global nuclear dangers Unique technical and policy solutions to reduce global nuclear and radiological dangers Cyber Security Image Cyber and Infrastructure

  15. budget request | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy(...

  16. NNSA: Securing Domestic Radioactive Material | National Nuclear...

    National Nuclear Security Administration (NNSA)

    established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove andor...

  17. NNSA: Securing Domestic Radioactive Material | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) NNSA: Securing Domestic Radioactive Material February 01, 2011 In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." The

  18. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  19. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    budget National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today... FY2016 Budget Request: Positioned for the 21st Century Mission Delivery Washington, DC - U.S. Department of Energy

  20. policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA Deputy promotes collaboration on global deterrence at USSTRATCOM deterrence symposium Last month more than 650

  1. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  2. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  3. Global Energy Futures Model

    Energy Science and Technology Software Center (OSTI)

    2004-01-01

    The Global Energy Futures Model (GEFM) is a demand-based, gross domestic product (GDP)-driven, dynamic simulation tool that provides an integrated framework to model key aspects of energy, nuclear-materials storage and disposition, environmental effluents from fossil and non fossil energy and global nuclear-materials management. Based entirely on public source data, it links oil, natural gas, coal, nuclear and renewable energy dynamically to greenhouse-gas emissions and 13 other measures of environmental impact. It includes historical data frommore » 1990 to 2000, is benchmarked to the DOE/EIA/IEO 2002 [5] Reference Case for 2000 to 2020, and extrapolates energy demand through the year 2050. The GEFM is globally integrated, and breaks out five regions of the world: United States of America (USA), the Peoples Republic of China (China), the former Soviet Union (FSU), the Organization for Economic Cooperation and Development (OECD) nations excluding the USA (other industrialized countries), and the rest of the world (ROW) (essentially the developing world). The GEFM allows the user to examine a very wide range of what ir scenarios through 2050 and to view the potential effects across widely dispersed, but interrelated areas. The authors believe that this high-level learning tool will help to stimulate public policy debate on energy, environment, economic and national security issues.« less

  4. National Nuclear Security Administration | Department of Energy

    Office of Environmental Management (EM)

    Administration National Nuclear Security Administration National Nuclear Security Administration (704.88 KB) More Documents & Publications Global Threat Reduction Initiative U.S. Global Threat Reduction Initiative/U.S.-Origin Nuclear Fuel Removals EIS-0249: Record of Decision (September 1996)

  5. EGS Directorate Organization Chart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Todd E. Combs (Interim) Associate Lab Director Divisions Global Security Sciences (GSS) Keith S. Bradley (Interim) Energy Systems (ES) Donald G. Hillebrand Nuclear Engineering (NE) Jordi Roglans-Ribas Strategic Program Planning and Development National and Global Security Keith S. Bradley Water Seth W. Snyder Centers, Institutes, and Program O ces Risk and Infrastructure Science Center (GSS) David K. Brannegan Center for Transportation Research (ES) Ann M. Schlenker Center for

  6. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  7. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration | (NNSA) Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK November 19, 2015 WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In total, 55 participants from 15 countries and 9 international

  8. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  9. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  10. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  12. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  13. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  14. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  15. National Nuclear Security Administration ENERGY U.S. DEPARTMENT OF

    National Nuclear Security Administration (NNSA)

    Operating Efficiently / Engaging Globally FY 2013 Annual Report Table of Contents 1 Operating Efficiently / Engaging Globally 2 Office of Nonproliferation and International Security 4 Office of Nuclear Safeguards and Security 5 Next Generations Safeguards Initiative (NGSI) 6 International Nuclear Safeguards Engagement Program (INSEP): First Engagement with Burma 7 Safeguards Technology Development 9 Safeguards Policy: IAEA Transit Matching Workshop 10 International Nuclear Security (INS) 12

  16. NNSA: Securing Domestic Radioactive Material | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) NNSA: Securing Domestic Radioactive Material May 29, 2014 Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove and/or facilitate the disposition of high risk nuclear and radiological materials around the world that pose a threat to the United States and the international community. GTRI's mission is to reduce and protect vulnerable nuclear

  17. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  18. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  19. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  20. U.S. Homeland Security R&D Budgets

    SciTech Connect (OSTI)

    Halvorson, C S

    2009-03-30

    The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  3. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  4. February 2011 | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Enterprise Elected as AAAS Fellows NNSA CIO Joins Collaborative IT Organization U.S., China Partner to Improve Nuclear Security Sandia Rededicates Facility as Pete V. Domenici ...

  5. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  6. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  7. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  15. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  16. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  17. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  18. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  19. Tag: global security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Category: News Sizing up nuclear fuel The IAEA relies on Y-12 expertise to analyze the powder and pellets that fuel nuclear reactors. More... Category: About Broader National ...

  20. Office of Electricity Delivery and Energy Reliability Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise Global Forum, U.S. Energy ...

  1. Small Modular Reactors, National Security and Clean Energy: A...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Small Modular Reactors, National Security and Clean Energy: A U.S. National Strategy Dr. ... driven, but unsuccessful Global Nuclear Energy Partnership and suggest how that ...

  2. Fact Sheet: The United States and Caspian Energy Security | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The U.S. government encourages Caspian countries to increase regional cooperation to ... Related Articles Fact Sheet: U.S-Turkey Cooperation in Global Energy Security Acting ...

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  6. Radiological Sites in Hawaii Complete NNSA Security Enhancements | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration | (NNSA) Radiological Sites in Hawaii Complete NNSA Security Enhancements August 12, 2011 HONOLULU - The National Nuclear Security Administration (NNSA) today recognized the state of Hawaii and the city and county of Honolulu for completing security enhancements on all high priority radiological materials. The voluntary enhancements came with the assistance of NNSA's Global Threat Reduction Initiative (GTRI) and further improve radiological material security

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  8. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  9. Mission | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Mission Mission Statement "Enhancing and ensuring the future of the Nuclear Security Enterprise through effective nuclear production operations" Mission Execute effective contract management and oversight to safely and securely maintain the nuclear weapon stockpile for the Nuclear Security Enterprise; provide enriched uranium for naval, research, and isotope production reactors, and support nonproliferation activities to reduce the global nuclear threat. Vision Make the world safer by

  10. budget request | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    budget request National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today... FY2016 Budget Request: Positioned for the 21st Century Mission Delivery Washington, DC - U.S. Department of

  11. Budget | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Budget Full details of the President's FY17 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy Feb. 9, 2016 (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today released details of its portion of

  12. Global patterns and controls of soil organic carbon dynamics as simulated by multiple terrestrial biosphere models. Current status and future directions

    SciTech Connect (OSTI)

    Tian, Hanqin; Lu, Chaoqun; Yang, Jia; Banger, Kamaljit; Huntzinger, Deborah N.; Schwalm, Christopher R.; Michalak, A. M.; Cook, Robert B.; Ciais, Philippe; Hayes, Daniel J.; Huang, Maoyi; Ito, Akihiko; Jain, Atul K.; Lei, Huimin; Mao, Jiafu; Pan, Shufen; Post, W. M.; Peng, Shushi; Poulter, Benjamin; Ren, Wei; Ricciuto, Daniel M.; Schaefer, Kevin; Shi, Xiaoying; Tao, Bo; Wang, Weile; Wei, Yaxing; Yang, Qichun; Zhang, Bowen; Zeng, Ning

    2015-06-05

    Soil is the largest organic carbon (C) pool of terrestrial ecosystems, and loss from soil accounts for a large pro portion of land-atmosphere C exchange. Due to large pool size and variable residence time from years to millennia, even small changes in soil organic C(SOC) have substantial effects on the terrestrial C budget, thereby affecting atmospheric carbon dioxide (CO2)concentration and climate change. In the past decades, a wide variety of studies have been conducted to quantify global SOC stocks and soil exchange with the atmosphere through site measurements, inventories, and empirical/process-based modeling. However, these estimates are highly uncertain and identifying major driving forces controlling soil C storage and fluxes remains a key research challenge his study has compiled century-long (1901-2010)estimates of SOC storage and heterotrophic respiration (Rh) from ten terrestrial biosphere models (TBMs) in the Multi-scale Synthesis and Terrestrial Model Intercomparison Project (MsTMIP) and two observation based datasets. The ten-TBM ensemble shows that global SOC estimate range from 4 to 2111 Pg C (1 Pg = 1015g) with a median value of 1158 Pg C33 in 2010. Modeling approach estimates a broad range of Rh from 35 to 69 Pg C yr-1 with a median value of 51Pg C yr-1 during 200–2010. The largest uncertainty in SOC stocks exists in the 40–65°N latitude band while Rh differences are the largest in the tropics. All the models agreed that climate and land use changes have decreased SOC stocks while elevated CO2 and atmospheric nitrogen deposition have increased SOC stocks though the response varied significantly among models. Model representations of temperature and moisture sensitivity,nutrient limitation and land use partially explain the divergent estimates of global SOC stocks and soil fluxes in this study. In addition, major sources of uncertainty from model estimation include exclusion of SOC storage in

  13. Global patterns and controls of soil organic carbon dynamics as simulated by multiple terrestrial biosphere models: Current status and future directions

    SciTech Connect (OSTI)

    Tian, Hanqin; Lu, Chaoqun; Yang, Jia; Banger, Kamaljit; Huntzinger, Deborah N.; Schwalm, Christopher R.; Michalak, Anna M.; Cook, Robert; Ciais, Philippe; Hayes, Daniel; Huang, Maoyi; Ito, Akihiko; Jain, Atul K.; Lei, Huimin; Mao, Jiafu; Pan, Shufen; Post, Wilfred M.; Peng, Shushi; Poulter, Benjamin; Ren, Wei; Ricciuto, Daniel; Schaefer, Kevin; Shi, Xiaoying; Tao, Bo; Wang, Weile; Wei, Yaxing; Yang, Qichun; Zhang, Bowen; Zeng, Ning

    2015-06-05

    Soil is the largest organic carbon (C) pool of terrestrial ecosystems, and C loss from soil accounts for a large proportion of land-atmosphere C exchange. Therefore, a small change in soil organic C (SOC) can affect atmospheric carbon dioxide (CO₂) concentration and climate change. In the past decades, a wide variety of studies have been conducted to quantify global SOC stocks and soil C exchange with the atmosphere through site measurements, inventories, and empirical/process-based modeling. However, these estimates are highly uncertain, and identifying major driving forces controlling soil C dynamics remains a key research challenge. This study has compiled century-long (1901–2010) estimates of SOC storage and heterotrophic respiration (Rh) from 10 terrestrial biosphere models (TBMs) in the Multi-scale Synthesis and Terrestrial Model Intercomparison Project and two observation-based data sets. The 10 TBM ensemble shows that global SOC estimate ranges from 425 to 2111 Pg C (1 Pg = 10¹⁵ g) with a median value of 1158 Pg C in 2010. The models estimate a broad range of Rh from 35 to 69 Pg C yr⁻¹ with a median value of 51 Pg C yr⁻¹ during 2001–2010. The largest uncertainty in SOC stocks exists in the 40–65°N latitude whereas the largest cross-model divergence in Rh are in the tropics. The modeled SOC change during 1901–2010 ranges from –70 Pg C to 86 Pg C, but in some models the SOC change has a different sign from the change of total C stock, implying very different contribution of vegetation and soil pools in determining the terrestrial C budget among models. The model ensemble-estimated mean residence time of SOC shows a reduction of 3.4 years over the past century, which accelerate C cycling through the land biosphere. All the models agreed that climate and land use changes decreased SOC stocks, while elevated atmospheric CO₂ and nitrogen deposition over intact ecosystems increased SOC stocks—even though the responses varied significantly

  14. Global patterns and controls of soil organic carbon dynamics as simulated by multiple terrestrial biosphere models: Current status and future directions

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Tian, Hanqin; Lu, Chaoqun; Yang, Jia; Banger, Kamaljit; Huntzinger, Deborah N.; Schwalm, Christopher R.; Michalak, Anna M.; Cook, Robert; Ciais, Philippe; Hayes, Daniel; et al

    2015-06-05

    Soil is the largest organic carbon (C) pool of terrestrial ecosystems, and C loss from soil accounts for a large proportion of land-atmosphere C exchange. Therefore, a small change in soil organic C (SOC) can affect atmospheric carbon dioxide (CO₂) concentration and climate change. In the past decades, a wide variety of studies have been conducted to quantify global SOC stocks and soil C exchange with the atmosphere through site measurements, inventories, and empirical/process-based modeling. However, these estimates are highly uncertain, and identifying major driving forces controlling soil C dynamics remains a key research challenge. This study has compiled century-longmore » (1901–2010) estimates of SOC storage and heterotrophic respiration (Rh) from 10 terrestrial biosphere models (TBMs) in the Multi-scale Synthesis and Terrestrial Model Intercomparison Project and two observation-based data sets. The 10 TBM ensemble shows that global SOC estimate ranges from 425 to 2111 Pg C (1 Pg = 10¹⁵ g) with a median value of 1158 Pg C in 2010. The models estimate a broad range of Rh from 35 to 69 Pg C yr⁻¹ with a median value of 51 Pg C yr⁻¹ during 2001–2010. The largest uncertainty in SOC stocks exists in the 40–65°N latitude whereas the largest cross-model divergence in Rh are in the tropics. The modeled SOC change during 1901–2010 ranges from –70 Pg C to 86 Pg C, but in some models the SOC change has a different sign from the change of total C stock, implying very different contribution of vegetation and soil pools in determining the terrestrial C budget among models. The model ensemble-estimated mean residence time of SOC shows a reduction of 3.4 years over the past century, which accelerate C cycling through the land biosphere. All the models agreed that climate and land use changes decreased SOC stocks, while elevated atmospheric CO₂ and nitrogen deposition over intact ecosystems increased SOC stocks—even though the responses varied

  15. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  16. Global Climate & Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Participated in the 2013 Domenici Public Policy Conference Carbon Capture & Storage, Carbon Storage, Climate, Earth Sciences Research Center, Energy, Global Climate & Energy, Global Climate & Energy, News, News & Events, Systems Analysis, Systems Engineering, Water Security Sandia Participated in the 2013 Domenici Public Policy Conference Marianne Walck, Director of Sandia's Geoscience, Climate, and Consequence Effects Center, spoke on "Hydraulic Fracturing: The Role

  17. Energy and Global Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Heavy-duty partnership Argonne working with China to research technology for efficient vehicles More Self-healing surprise Revolutionary film regenerates itself as it lubricates engines and other moving parts More Argonne to lead CERC-TRUCK consortium Program aims to improve on-road freight efficiency of medium- and heavy-duty trucks More Idle hands New improved tool to aid in reducing engine idling More Excellence in technology transfer Argonne researchers win Federal Laboratory Consortium

  18. GE Global Research Leadership | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About GE Global Research > Leadership Leadership GE Global Research Centers rely on the guidance of visionary leaders with deep technical knowledge on the ground at each of our sites. A photo of Vic Abate Vic Abate Chief Technology Officer GE Global Research As senior vice president and chief technology officer for GE, Vic is responsible for one of the world's largest and most diversified industrial research and technology organizations. Vic leads GE's 50,000 engineers and scientists and G...

  19. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  20. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  1. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  2. frmac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    frmac Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset available on request by the Department of Homeland Security (DHS) and state and local agencies to respond to a nuclear or radiological incident. The FRMAC is an interagency organization with representation... Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management

  3. CTBT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBT NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... Head of Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) Preparatory Commission Visits NNSA's

  4. Security control methods for CEDR

    SciTech Connect (OSTI)

    Rotem, D.

    1990-09-01

    The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

  5. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  6. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  10. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  11. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  12. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  13. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  14. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  16. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  17. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  18. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  19. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  20. Information System Security Manager (ISSM) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Manager (ISSM) Information System Security Manager (ISSM) macbook-925595_960_720.jpg The Information Security System Manager (ISSM) is designated by an operating unit's (DOE organization or site) Senior Manager to manage the unit's cyber security program. The ISSM establishes, documents, and monitors an operating unit's cyber security program implementation plan, and ensures compliance with DOE management policies. Candidates must possess a working knowledge of cyber security policies and

  1. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  2. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  3. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  4. National Nuclear Security Administration U.S Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | National Nuclear Security Administration | (NNSA) National Nuclear Security Administration Highlights FY'17 Budget Request February 09, 2016 Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today released details of its portion of the President's FY

  5. National Nuclear Security Administration Highlights FY'17 Budget Request

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration | (NNSA) Nuclear Security Administration Highlights FY'17 Budget Request February 09, 2016 Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today released details of its portion of the President's FY 2017

  6. Sandia National Laboratories: National Security Missions: Nuclear Weapons

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Programs Nuclear Weapons Stockpile Stewardship Ensuring the nation's nuclear weapons stockpile is safe, secure, and reliable. About Nuclear Weapons Since 1949, Sandia's scientists and engineers have conducted breakthrough research in weaponization. About Safety & Security Safe and secure nuclear weapons are of paramount importance in a changing global threat environment. Safety and Security Science & Technology Sandia provides the science and engineering to help maintain and certify the

  7. Global Cool Cities Alliance

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) is currently supporting the Global Cool Cities Alliance (GCCA), a non-profit organization that works with cities, regions, and national governments to speed the...

  8. Los Alamos National Security awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    grants to 24 nonprofits in Northern New Mexico February 5, 2009 LOS ALAMOS, New Mexico, February 5, 2009 - Local nonprofit organizations that benefit from volunteer efforts by employees of Los Alamos National Laboratory received an additional assist: $265,000 in special one-time Community Giving grants from Los Alamos National Security, LLC (LANS), the company that manages the Laboratory. Twenty-four nonprofit organizations from Los Alamos, Española, Taos, Santa Fe, Albuquerque, and Carlsbad

  9. PCS Security Technology Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2007-01-30

    P-STET assists in the security technology decision making process from a costlbeneflt perspective. It aids in addressing such questions as whether to acquire and deploy new security technology, to re-configure an existing product or system, or to maintain status quo. P-STET offers both a qualitative and quantitative option. P-STET is most efficient when tailored to an organization’s security cost/benefit environment. It then serves as both a guide to show what types of security questions shouldmore » be addressed and as a means to analyze the data gathered from the questions to make an informed decision. The quantitative option provides a straightforward way to express costs/benefits in terms of dollars. It relies on the organization to quantify benefits or cost avoidances, and, therefore, best serves as a guide to ensure various cost and benefit angles are evaluated. The qualitative option allows the organization to assess costs by levels with respect to security and PCS budgets, operational impacts, and opportunity costs. Benefits are represented in terms of improvements to the organization’s operations and are also assessed by levels with respect to some benchmark such as compliance with best practices. Results are displayed graphically using radar charts, allowing the user to make a more intuitive decision. The shaded area of each chart represents the overall cost and benefit of the security investment. A good investment is denoted when the ratio of benefit shaded area to cost shaded area is large.« less

  10. laos | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    laos DOE/NNSA's Nonproliferation Experts Lead First Workshop on the IAEA Additional Protocol in Lao PDR Twenty-five participants from the Lao Ministry of Foreign Affairs, Ministry of Science and Technology and other key stakeholder organizations attended the event. WASHINGTON - The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) sponsored the Fundamentals of Nuclear

  11. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  12. The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security The CIP Report, Vol.11, No. 2 (August 2012): Smart Grid Security The August 2012 issue of The CIP Report highlights the significance of and the challenges to securing the smart grid, with contributions from DOE's Hank Kenchington, Progress Energy, Schweitzer Engineering Laboratory, the Director of Global Supply Chain Security with the National Security Staff, and more. The CIP Report: Smart Grid Security

  13. Department of Energy Cyber Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-06

    Modifications correct changes to the composition of Senior DOE Management organizations, name change from DOE Cyber Incident Response Capability to Joint Cybersecurity Coordination Center and transfer of responsibility for communications security and TEMPEST to the Office of Health, Safety and Security.

  14. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  15. meetamachine | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    meetamachine Meet a Machine: AMS is NNSA's eye in the sky The Aerial Measuring System (AMS) provides a sophisticated radiation detection system that supports NNSA's mission to prepare for, respond to, and mitigate nuclear and radiological accidents and incidents globally. AMS provides real-time measurements of ground contamination. By quickly... Meet a Machine: Explosive science is booming at Livermore Lab's Contained Firing Facility A key mission of the National Nuclear Security Administration

  16. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  17. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  18. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  19. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  20. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  1. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  3. Secretary Chu to Focus on Opportunities for Global Cooperation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The program will also address needed energy investments in security, sustainable development and global poverty alleviation. Following his trip to Rome, Secretary Chu will travel ...

  4. NNSA's Global Threat Reduction Initiative Removes More Than One...

    National Nuclear Security Administration (NNSA)

    Global Threat Reduction Initiative Removes More Than One Ton of Food | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  5. Secretary Chu to Focus on Opportunities for Global Cooperation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    also address needed energy investments in security, sustainable development and global poverty alleviation. Following his trip to Rome, Secretary Chu will travel to the United...

  6. Secretary Bodman Meets with Global Energy Ministers at the Internation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bodman emphasizes the need for international cooperation to improve global energy security ... Lastly, Secretary Bodman discussed the importance of enhanced cooperation and coordination ...

  7. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  8. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  9. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  10. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  11. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  12. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  13. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  14. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  15. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  16. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  18. About Us | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Home About Us Established by Congress in 2000, NNSA is a semi-autonomous agency within the U.S. Department of Energy responsible for enhancing national security through the military application of nuclear science. NNSA maintains and enhances the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear explosive testing; works to reduce the global danger from weapons of mass destruction; provides the U.S. Navy with safe and effective nuclear propulsion; and

  19. Our Leadership | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Leadership The NNSA plays a critical role in ensuring the security of our Nation by maintaining the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear testing; reducing the global danger from the proliferation of nuclear weapons and materials; providing the U.S. Navy with safe and effective nuclear propulsion; and providing the Nation with an effective nuclear counterterrorism and incident response capability. The NNSA plays a critical role in ensuring the

  20. Our Mission | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Home Our Mission Established by Congress in 2000, NNSA is a semi-autonomous agency within the U.S. Department of Energy responsible for enhancing national security through the military application of nuclear science. NNSA maintains and enhances the safety, security, and effectiveness of the U.S. nuclear weapons stockpile without nuclear testing; works to reduce the global danger from weapons of mass destruction; provides the U.S. Navy with safe and effective nuclear propulsion; and responds to

  1. NNSA Receives Diversity Award | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Established by Congress in 2000, NNSA is a separately organized agency within the U.S. Department of Energy responsible for enhancing national security through the military ...

  2. Global Climate & Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandians Published in American Chemical Society's Environmental Science & Technology Analysis, Climate, Energy, Global Climate & Energy, Modeling, Modeling & Analysis, News, News & Events, Systems Analysis, Water Security Sandians Published in American Chemical Society's Environmental Science & Technology Electricity use by water service sector and county. Shown are electricity use by (a) large-scale conveyance, (b) groundwater irrigation pumping, (c) surface water irrigation

  3. National Nuclear Security Administration honors Y-12 employees | Y-12

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Atlantic Treaty Organization NCT Nuclear Counterterrorism NCTIR Nuclear Counterterrorism and Incident Response Program NDAA National Defense Authorization Act NELA Nuclear Explosive Like-Assembly NEST Nuclear Emergency Support Team NGSI Next Generation Safeguards Initiative NIS Nonproliferation and International Security Program NMF National Mission Force NNSA National Nuclear Security Administration NNSS Nevada National Security Site NPAC Nonproliferation Policy and Arms Control Program NPT

  4. National Nuclear Security Administration United States Department of Energy

    National Nuclear Security Administration (NNSA)

    Atlantic Treaty Organization NCT Nuclear Counterterrorism NCTIR Nuclear Counterterrorism and Incident Response Program NDAA National Defense Authorization Act NELA Nuclear Explosive Like-Assembly NEST Nuclear Emergency Support Team NGSI Next Generation Safeguards Initiative NIS Nonproliferation and International Security Program NMF National Mission Force NNSA National Nuclear Security Administration NNSS Nevada National Security Site NPAC Nonproliferation Policy and Arms Control Program NPT

  5. National Nuclear Security Administration United States Department of Energy

    National Nuclear Security Administration (NNSA)

    America Treaty Organization NCT Nuclear Counterterrorism NCTIR Nuclear Counterterrorism and Incident Response Program NDAA National Defense Authorization Act NELA Nuclear Explosive Like-Assembly NEST Nuclear Emergency Support Team NGSI Next Generation Safeguards Initiative NIS Nonproliferation and International Security Program NMF National Mission Force NNSA National Nuclear Security Administration NNSS Nevada Nuclear Security Site NPAC Nonproliferation Policy and Arms Control Program NPT

  6. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  7. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  8. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  9. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  10. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect (OSTI)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  11. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore »and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  12. Beyond a series of security nets: Applying STAMP & STPA to port security

    SciTech Connect (OSTI)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.

  13. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  14. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01

    next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  15. Control Systems Security News Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    » Control Systems Security News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes

  16. Integrating Safeguards, Security, & Emergency Services at CNS | Y-12

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Complex Integrating Safeguards, ... Integrating Safeguards, Security, & Emergency Services at CNS Posted: October 14, 2015 - 5:34pm Lindy Pyatt, Y-12 S&S Performance Assurance Issues Management, assists Gannon Tucker, the CNS SS&ES change control administrator based at Pantex, with consolidating security's document control. Integrating organizations across two states (and two time zones) can be complex. The divisions within the Safeguards, Security, &

  17. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  18. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  19. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  20. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  1. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  2. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  4. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  5. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  6. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  7. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  8. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  9. U.S., Russia Agree to Extend Nuclear Security Cooperation | National...

    National Nuclear Security Administration (NNSA)

    "The United States and Russia remain committed partners in improving global nuclear security, combating weapons proliferation, and preventing dangerous nuclear equipment and ...

  10. Workshop at Nevada National Security Site Brings Together Experts from a

    National Nuclear Security Administration (NNSA)

    Dozen Countries | National Nuclear Security Administration | (NNSA) Workshop at Nevada National Security Site Brings Together Experts from a Dozen Countries April 04, 2014 LAS VEGAS - Representatives from 11 countries and Taiwan came together recently at the Nevada National Security Site to participate in a workshop on nuclear security best practices organized by the National Nuclear Security Administration (NNSA) and the World Institute for Nuclear Security (WINS). This workshop, building

  11. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  12. DOE Statement on UK Government's "Road to 2010" Report on Nuclear Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Statement on UK Government's "Road to 2010" Report on Nuclear Security DOE Statement on UK Government's "Road to 2010" Report on Nuclear Security July 17, 2009 - 12:00am Addthis WASHINGTON, DC - Thomas P. D'Agostino, the Department of Energy's Under Secretary for Nuclear Security and Administrator of the National Nuclear Security Administration, today applauded the British government's new report on advancing the global nuclear security agenda.

  13. Visualizing Cyber Security: Usable Workspaces

    SciTech Connect (OSTI)

    Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

    2009-10-11

    An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

  14. Embracing the Cloud for Better Cyber Security

    SciTech Connect (OSTI)

    Shue, Craig A; Lagesse, Brent J

    2011-01-01

    The future of cyber security is inextricably tied to the future of computing. Organizational needs and economic factors will drive computing outcomes. Cyber security researchers and practitioners must recognize the path of computing evolution and position themselves to influence the process to incorporate security as an inherent property. The best way to predict future computing trends is to look at recent developments and their motivations. Organizations are moving towards outsourcing their data storage, computation, and even user desktop environments. This trend toward cloud computing has a direct impact on cyber security: rather than securing user machines, preventing malware access, and managing removable media, a cloud-based security scheme must focus on enabling secure communication with remote systems. This change in approach will have profound implications for cyber security research efforts. In this work, we highlight existing and emerging technologies and the limitations of cloud computing systems. We then discuss the cyber security efforts that would support these applications. Finally, we discuss the implications of these computing architecture changes, in particular with respect to malware and social engineering.

  15. emergency preparedness | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    emergency preparedness NNSA hosts IAEA Directors to discuss emergency preparedness & response partnership NNSA hosted the International Atomic Energy Agency (IAEA) - a core partner of the agency's global nonproliferation and counterterrorism efforts - to discuss cooperative efforts in emergency preparedness and response. Early in their visit, IAEA Deputy Director General Juan Carlos Lentijo... NNSA & Nuclear Security Enterprise support nation's preparedness Scientists at NNSA facilities

  16. Prevent Counter | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Prevent Counter NNSA Releases New Nuclear Prevent, Counter, and Respond Report Comprehensive Overview of NNSA's Nonproliferation and Anti-terror Strategy WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) released its report on NNSA's efforts to prevent nuclear proliferation and terrorism, Prevent, Counter, and Respond-A Strategic Plan to Reduce Global

  17. and Respond | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and Respond NNSA Releases New Nuclear Prevent, Counter, and Respond Report Comprehensive Overview of NNSA's Nonproliferation and Anti-terror Strategy WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) released its report on NNSA's efforts to prevent nuclear proliferation and terrorism, Prevent, Counter, and Respond-A Strategic Plan to Reduce Global

  18. National Nuclear Security Administration United States Department of Energy

    National Nuclear Security Administration (NNSA)

    United States Department of Energy Washington, DC 20585 Prevent, Counter, and Respond-A Strategic Plan to Reduce Global Nuclear Threats FY 2017-FY 2021 Report to Congress March 2016 This page left blank intentionally. Department of Energy/National Nuclear Security Administration | March 2016 Prevent, Counter, and Respond--A Strategic Plan to Reduce Global Nuclear Threats (FY 2017-FY 2021)| Page i Message from the Administrator The Department of Energy's National Nuclear Security Administration

  19. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  20. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  1. Final Report, The Influence of Organic-Aerosol Emissions and Aging on Regional and Global Aerosol Size Distributions and the CCN Number Budget

    SciTech Connect (OSTI)

    Donahue, Neil M.

    2015-12-23

    We conducted laboratory experiments and analyzed data on aging of organic aerosol and analysis of field data on volatility and CCN activity. With supplemental ASR funding we participated in the FLAME-IV campaign in Missoula MT in the Fall of 2012, deploying a two-chamber photochemical aging system to enable experimental exploration of photochemical aging of biomass burning emissions. Results from that campaign will lead to numerous publications, including demonstration of photochemical production of Brown Carbon (BrC) from secondary organic aerosol associated with biomass burning emissions as well as extensive characterization of the effect of photochemical aging on the overall concentrations of biomass burning organic aerosol. Excluding publications arising from the FLAME-IV campaign, project research resulted in 8 papers: [11, 5, 3, 10, 12, 4, 8, 7], including on in Nature Geoscience addressing the role of organic compounds in nanoparticle growth [11

  2. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  3. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  4. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  5. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  6. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  7. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  8. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  9. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  10. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  11. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  12. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    federal budget FY2015 Budget Request: Preserving President Obama's Nuclear Security Vision WASHINGTON, D.C. - The President's FY2015 Budget Request for the National Nuclear Security Administration (NNSA), delivered to Congress today, includes $11.7 billion to support NNSA's continued efforts to keep the American people safe by modernizing the U.S. nuclear stockpile, executing an... Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial

  13. Organization | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Organization Organization Organization

  14. A common language for computer security incidents

    SciTech Connect (OSTI)

    John D. Howard; Thomas A Longstaff

    1998-10-01

    Much of the computer security information regularly gathered and disseminated by individuals and organizations cannot currently be combined or compared because a common language has yet to emerge in the field of computer security. A common language consists of terms and taxonomies (principles of classification) which enable the gathering, exchange and comparison of information. This paper presents the results of a project to develop such a common language for computer security incidents. This project results from cooperation between the Security and Networking Research Group at the Sandia National Laboratories, Livermore, CA, and the CERT{reg_sign} Coordination Center at Carnegie Mellon University, Pittsburgh, PA. This Common Language Project was not an effort to develop a comprehensive dictionary of terms used in the field of computer security. Instead, the authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information. They hope these high-level terms and their structure will gain wide acceptance, be useful, and most importantly, enable the exchange and comparison of computer security incident information. They anticipate, however, that individuals and organizations will continue to use their own terms, which may be more specific both in meaning and use. They designed the common language to enable these lower-level terms to be classified within the common language structure.

  15. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  16. Financing a Global Deal on Climate Change | Open Energy Information

    Open Energy Info (EERE)

    Financing a Global Deal on Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing a Global Deal on Climate Change AgencyCompany Organization: United...

  17. Financing Global Climate Change Mitigation | Open Energy Information

    Open Energy Info (EERE)

    Global Climate Change Mitigation Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing Global Climate Change Mitigation AgencyCompany Organization: United Nations...

  18. Situated Usability Testing for Security Systems

    SciTech Connect (OSTI)

    Greitzer, Frank L.

    2011-03-02

    While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.

  19. The Global Energy Challenge

    ScienceCinema (OSTI)

    Crabtree, George

    2010-01-08

    The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use.   The continued use of fossil fuels raises concerns about supply, security, environment and climate.  New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.

  20. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  1. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  2. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  3. Global Solutions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Solutions Our Vision National User Facilities Research Areas In Focus Global Solutions ⇒ Navigate Section Our Vision National User Facilities Research Areas In Focus Global Solutions A-Z Index Berkeley Lab masthead U.S. Department of Energy logo Phone Book Jobs Search BANGLADESH INDIA CHINA DAYA BAY CHINA RUSSIA SIBERIA JAPAN SAMOA HAWAII SOUTH POLE ANTARCTICA NEW MEXICO SOUTH DAKOTA TEXAS GULF OF MEXICO NEW YORK PUERTO RICO AMAZON RAIN FOREST CANARY ISLANDS SWITZERLAND ETHIOPIA

  4. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect (OSTI)

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  5. Next Generation National Security Leaders

    SciTech Connect (OSTI)

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

  6. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  7. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  8. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  9. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  10. Lawrence Livermore National Laboratory Safeguards and Security quarterly progress report ending March 31, 1996

    SciTech Connect (OSTI)

    Davis, B.; Davis, G.; Johnson, D.; Mansur, D.L.; Ruhter, W.D.; Strait, R.S.

    1996-04-01

    LLNL carries out safeguards and security activities for DOE Office of Safeguards and Security (OSS) and other organizations within and outside DOE. LLNL is supporting OSS in 6 areas: safeguards technology, safeguards and materials accountability, computer security--distributed systems, complex-wide access control, standardization of security systems, and information technology and security center. This report describes the activities in each of these areas.

  11. Using safety tools to improve security

    SciTech Connect (OSTI)

    Pond, D. J.

    2003-01-01

    Human error assessment and other safety analysis tools reveal that worker errors contributing to or resulting in accidents are often the consequence of ineffective system conditions, process features, or individual employee characteristics. At Los Alamos National Laboratory (LANL), a team of security, safety, human error, and organizational experts considered whether the system-induced human errors that make accidents more likely could also be contributing factors to security incidents. Because our review of more than 100 such incidents suggests they can and do, LANL has adapted error assessment tools and reduction techniques for application to security tasks and operations. Safety professionals--especially those with human error assessment and mitigation expertise--have the knowledge and skills needed to apply these tools in enhancing security in their own organizations.

  12. National Security Technology Incubator Operations Plan

    SciTech Connect (OSTI)

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  13. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  16. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  17. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  18. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  19. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  20. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  2. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  3. Provision of mobile and man-portable radiation detection equipment;
  4. Regional cooperation on safeguards...

  5. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  6. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  7. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  8. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  9. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  10. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  11. Global Renewable Energy Database | Open Energy Information

    Open Energy Info (EERE)

    LAUNCH TOOL Name: Global Renewable Energy Database AgencyCompany Organization: German Aerospace Center (DLR) Sector: Energy Focus Area: Renewable Energy, Solar, Wind...

  12. NNSA: Working to Prevent Nuclear Proliferation | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) NNSA: Working to Prevent Nuclear Proliferation February 01, 2011 NNSA's Office of Nonproliferation and International Security (NIS) provides leadership in the formulation and implementation of nonproliferation, nuclear security, and arms control strategies to advance U.S. national security objectives. NIS draws on and contributes to a wide range of technical resources within the U.S. National Laboratory complex, working in concert with international organizations and

  13. FY 2005 Control Table by Organization

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Organization (dollars in thousands - OMB Scoring) Table of Contents Summary...................................................................................................... 1 Mandatory Funding....................................................................................... 2 National Nuclear Security Administration..................................................... 3 Energy Efficiency and Renewable Energy.................................................... 4 Electric Transmission

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  17. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  18. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  19. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  20. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  21. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  22. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  1. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  2. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  3. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  4. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  5. September 2016 | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    September 2016 NNSA hosts IAEA Directors to discuss emergency preparedness & response partnership Wednesday, September 14, 2016 - 3:17pm NNSA hosted the International Atomic Energy Agency (IAEA) - a core partner of the agency's global nonproliferation and counterterrorism efforts - to discuss cooperative efforts in emergency preparedness and response. Early in their visit, IAEA Deputy Director General Juan Carlos Lentijo, IAEA Division of Nuclear Security Raja Adnan, and Ambassador Laura

  6. Administrator's Update - July 2014 | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) July 2014 Wednesday, July 30, 2014 - 9:44am The NNSA holds a unique and important place in global nuclear science and technology. Through our laboratories and plants, our scientists conduct specialized research that is recognized internationally as among the best in the world. We should not take this for granted. America's National Security Strategy stresses that, "science and technology-and our ability to apply the ingenuity of our public and private sectors

  7. NNSA Blog | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Home NNSA Blog NNSA hosts IAEA Directors to discuss emergency preparedness & response partnership Wednesday, September 14, 2016 - 3:17pm NNSA hosted the International Atomic Energy Agency (IAEA) - a core partner of the agency's global nonproliferation and counterterrorism efforts - to discuss cooperative efforts in emergency preparedness and response. Early in their visit, IAEA Deputy Director General Juan Carlos Lentijo, IAEA Division of Nuclear Security Raja Adnan, and Ambassador Laura

  8. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  9. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  10. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  11. Office of Heath, Safety and Security Now Two New Offices

    Broader source: Energy.gov [DOE]

    To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

  12. DOE Undersecretary for Nuclear Security and NNSA Administrator...

    National Nuclear Security Administration (NNSA)

    Thursday, June 5, 2014 - 4:16pm DOE Undersecretary for Nuclear Security and NNSA ... NNSA Blog Julie Huff of B&W Y-12's Materials Management Organization leads a tour of the Highly ...

  13. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  14. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  15. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  16. GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS

    SciTech Connect (OSTI)

    Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

    2009-10-07

    The U.S. Department of Energys National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

  17. Global warming, global research, and global governing

    SciTech Connect (OSTI)

    Preining, O.

    1997-12-31

    The anticipated dangers of Global Warming can be mitigated by reducing atmospheric greenhouse gas concentrations, especially CO{sub 2}. To reach acceptable, constant levels within the next couple of centuries it might be necessary to accept stabilization levels higher than present ones, The annual CO{sub 2} emissions must be reduced far below today`s values. This is a very important result of the models discussed in the 1995 IPCC report. However, any even very modest scenario for the future must take into account a substantial increase in the world population which might double during the 21st century, There is a considerable emission reduction potential of the industrialized world due to efficiency increase, However, the demand for energy services by the growing world population will, inspite of the availability of alternative energy resources, possibly lead to a net increase in fossil fuel consumption. If the climate models are right, and the science community believes they are, we will experience a global warming of the order of a couple of degrees over the next century; we have to live with it. To be prepared for the future it is essential for us to use new research techniques embracing not only the familiar fields of hard sciences but also social, educational, ethical and economic aspects, We must find a way to build up the essential intellectual capacities needed to deal with these kinds of general problems within all nations and all societies. But this is not Although, we also have to find the necessary dynamical and highly flexible structures for a global governing using tools such as the environmental regime. The first step was the Framework Convention On Climate Change, UN 1992; for resolution of questions regarding implementations the Conference of the Parties was established.

  18. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  19. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. FactSheetOnGlobalClimateChange.pdf | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FactSheetOnGlobalClimateChange.pdf FactSheetOnGlobalClimateChange.pdf U (37.81 KB) More Documents & Publications U Twenty In Ten: Strengthening America's Energy Security Climate ...

  2. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  3. Voluntary Protection Program Onsite Review, National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  4. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers [EERE]

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  5. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  6. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  7. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  8. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  9. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  10. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  11. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  12. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  13. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  14. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  15. Security Cases | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    raised concerns about the individual's eligibility to maintain a security clearance. ... and (l), the individual's security clearance was suspended, and he requested a hearing. ...

  16. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  17. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  18. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  19. Nuclear Detection and Forensics | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Detection and ... Nuclear Detection and Forensics We have a firm foundation to support the science and technology needed for the important, growing areas of nuclear detection and forensics. A strong technical nuclear detection and forensics capability is important to the nation's security. It will help discourage foreign cooperation with terrorist elements and encourage greater global security for material that could be used to develop nuclear weapons. Because of Y-12's 70 years of

  20. NNSA Program Develops the Next Generation of Nuclear Security Experts

    SciTech Connect (OSTI)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  1. R&D proliferation detection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    R&D proliferation detection Research and Development The mission of the Office of Research and Development (R&D) is to support U.S. national and nuclear security objectives in reducing global nuclear security threats through the innovation of unilateral and multi-lateral technical capabilities to detect, identify, and characterize: 1) foreign... NNSA Announces Recipient of $25 Million Grant to Improve Technological Capabilities for Detecting Nuclear Proliferation Washington, D.C. - The

  2. NNSA Achievements: 2015 by the Numbers | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Achievements: 2015 by the Numbers VIDEO: 2015 by the numbers How did we perform this year? What did we accomplish? NNSA's nuclear security enterprise - including its laboratories, production facilities, and sites - provides unique technical solutions to solve the national security challenges of today and the future. In 2015, in addition to the Stockpile Stewardship and Management Plan and Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear

  3. Office of Electricity Delivery and Energy Reliability Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Selections | Department of Energy and Energy Reliability Cyber Security Project Selections Office of Electricity Delivery and Energy Reliability Cyber Security Project Selections On September 23, 2010, speaking at the inaugural GridWise Global Forum, U.S. Energy Secretary Steven Chu today announced the investment of more than $30 million for ten projects that will address cybersecurity issues facing the nation's electric grid. Together, these projects represent a significant

  4. Central Scrap Management Office | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security / Nuclear Material Recovery / Central Scrap Management ... Central Scrap Management Office The Y-12 Central Scrap Management Office serves as the U.S. Department of Energy repository for unirradiated uranium and provide technical assistance to DOE customers in the disposition of scrap uranium. CSMO manages scrap recovery, storage and disposition services for DOE programs. CSMO at the Y-12 National Security Complex provides centralized leadership and management of unirradiated

  5. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  6. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  7. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  10. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  11. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  13. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  14. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  15. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  16. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  17. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  18. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  19. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  20. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  1. Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    companies get boost from Los Alamos National Security November 19, 2012 Venture Acceleration Fund awards help region's businesses grow LOS ALAMOS, New Mexico, November 19, 2012- Two local biotech start ups, a water and power company and a hardware inventor are the latest recipients of $165,000 in Venture Acceleration Fund (VAF) awards from Los Alamos National Security, LLC. Mustomo, Inc., IX Power, Synfolia, and Tape-Ease will receive funding to take their products and services to the next

  2. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  3. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  4. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  5. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect (OSTI)

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  6. Help for the Developers of Control System Cyber Security Standards

    SciTech Connect (OSTI)

    Robert P. Evans

    2008-05-01

    A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

  7. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  8. How to implement security controls for an information security program at CBRN facilities

    SciTech Connect (OSTI)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  9. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  10. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Office of Secure Transportation The Office of Secure Transportation (OST) is managed by the National Nuclear Security Administration within the U. S. Department of Energy. OST is responsible for the safe and secure transport in the contiguous United States of government-owned special nuclear materials. These classified shipments can contain nuclear weapons or components, enriched uranium, or plutonium. The cargo is transported in highly modified secure tractor-trailers and escorted

  11. nevada national security site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nevada national security site NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T

  12. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  13. Design tools for complex dynamic security systems.

    SciTech Connect (OSTI)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III; Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  14. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real

  15. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  16. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  17. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  18. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  19. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  20. Headquarters Security Quick Reference Book

    Office of Energy Efficiency and Renewable Energy (EERE)

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  1. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  2. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    & III-4) ......9 * Classified Information Security Noncompliance ... * Additional Guidance Unique to Classified Information Security Enforcement ...

  3. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta; Shankar, Harihar; Joshi, Sunjoy

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  4. Global Arrays

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The Global Arrays (GA) toolkit provides an efficient and portable “shared-memory” programming interface for distributed-memory computers. Each process in a MIMD parallel program can asynchronously access logical blocks of physically distributed dense multi-dimensional arrays, without need for explicit cooperation by other processes. Unlike other shared-memory environments, the GA model exposes to the programmer the non-uniform memory access (NUMA) characteristics of the high performance computers and acknowledges that access to a remote portion of the sharedmore » data is slower than to the local portion. The locality information for the shared data is available, and a direct access to the local portions of shared data is provided. Global Arrays have been designed to complement rather than substitute for the message-passing programming model. The programmer is free to use both the shared-memory and message-passing paradigms in the same program, and to take advantage of existing message-passing software libraries. Global Arrays are compatible with the Message Passing Interface (MPI).« less

  5. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  6. Biological and Chemical Security

    SciTech Connect (OSTI)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  7. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  8. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified

  9. Italy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Italy NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of

  10. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  11. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  12. Secure content objects

    DOE Patents [OSTI]

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  13. Global Security Analysis and Training Program | Y-12 National...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    supported by this browser. Download video Captions: On Time: 2:16 min. Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism...

  14. Oak Ridge partners: Global security and fuel development | Y...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Posted: July 18, 2012 - 10:00am | Y-12 Report | Volume 9, Issue 1 | 2012 Additive manufacturing builds metal parts, layer by layer, such as this titanium piece ORNL fabricated for ...

  15. National Security Campus design team wins global award | National...

    National Nuclear Security Administration (NNSA)

    awards for their interior design elements. HNTB was tasked with designing a work space that was energizing, reflected our mission, and created a crisp, clean and bright...

  16. Energy and Global Security Directorate 2015 Strategic Plan | Argonne

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tax Credits: Stay Warm and Save MORE Money! Energy Tax Credits: Stay Warm and Save MORE Money! October 29, 2008 - 6:00am Addthis Allison Casey Senior Communicator, NREL With all of the news this month about the Emergency Economic Stabilization Act of 2008, you may have heard about the energy tax incentives that were included for both consumers and for business, utilities, and governments. If you are already preparing for winter and working to make your home more efficient, this is good news. The

  17. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  18. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land - Surrounded by 4,500 square

  19. Head of Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO)

    National Nuclear Security Administration (NNSA)

    Preparatory Commission Visits NNSA's Nevada National Security Site (NNSS) for First Time | National Nuclear Security Administration | (NNSA) Head of Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) Preparatory Commission Visits NNSA's Nevada National Security Site (NNSS) for First Time November 24, 2015 Dr. Lassina Zerbo of the Comprehensive Nuclear-Test-Ban Treaty Organization, center, inside the P-Tunnel at the Nevada National Security Site. P-Tunnel, a large tunnel inside Ranier

  20. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  1. Operated by Los Alamos National Security, LLC for the U.S. Department...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Lunar Prospector of the global elemental distribution (Lawrence et al., 1998) Water Thorium Ranger 4 Operated by Los Alamos National Security, LLC for the U.S. Department of ...

  2. Workforce Statistics | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Workforce Statistics The Semi Annual Report provides age, disability, diversity, education, pay plan, retirement eligibility, years of service, and veteran's status data. The Year-End reports include the semi-annual information, as well as information on hires; separations; promotions; and historical data for those organization's where it is available, for five years. National Nuclear Security Administration Kansas City Field Office NA 1 - Immediate Office of the Administrator Livermore Field

  3. emergency response assets | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    emergency response assets Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset available on request by the Department of Homeland Security (DHS) and state and local agencies to respond to a nuclear or radiological incident. The FRMAC is an interagency organization with representation... Radiation Emergency Assistance Center / Training Site NNSA's Radiation Emergency Assistance Center / Training Site (REAC/TS)

  4. responding to emergencies | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    responding to emergencies Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset available on request by the Department of Homeland Security (DHS) and state and local agencies to respond to a nuclear or radiological incident. The FRMAC is an interagency organization with representation... Radiation Emergency Assistance Center / Training Site NNSA's Radiation Emergency Assistance Center / Training Site (REAC/TS)

  5. Our History | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    History The NNSA was established by Congress in 2000 as a separately organized agency within the U.S. Department of Energy, responsible for the management and security of the nation's nuclear weapons, nuclear nonproliferation, and naval reactor programs. In 2002 NNSA reorganized, removing a layer of management by eliminating its regional operations offices in New Mexico, California and Nevada. Contract and project management oversight responsibility for NNSA's labs, plants and special facilities

  6. NNSA Timeline | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    History NNSA Timeline The NNSA was established by Congress in 2000 as a separately organized agency within the U.S. Department of Energy, responsible for the management and security of the nation's nuclear weapons, nuclear nonproliferation, and naval reactor programs. In 2002 NNSA reorganized, removing a layer of management by eliminating its regional operations offices in New Mexico, California and Nevada. NNSA headquarters retained responsibility for strategic and program planning, budgeting

  7. Los Alamos National Security supports community nonprofits

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANS supports community nonprofits Los Alamos National Security supports community nonprofits Nonprofit organizations are receiving more than $80,300 as a result of the volunteer efforts of LANL employees and retirees. June 1, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los

  8. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  10. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  11. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  12. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  15. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  16. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  17. Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information

    Open Energy Info (EERE)

    Global, Act Local (K:TGAL) Jump to: navigation, search Name Kyoto: Think Global, Act Local (K:TGAL) AgencyCompany Organization Netherlands Development Cooperation Sector...

  18. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 0930...

  19. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  20. Seeing A Factory As Never Before With 3D Laser Technology | GE Global

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  1. FY 2015 Summary Control Table by Organization

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5 Summary Control Table by Organization (dollars in thousands - OMB Scoring) Summary Control by Organization Page 1 FY 2015 Congressional Request FY 2013 FY 2014 FY 2014 FY 2014 FY 2015 Current Enacted Adjustments Current Congressional Approp. Approp. Approp. Request Discretionary Summary By Organization Department Of Energy By Organization National Nuclear Security Administration Weapons Activities............................................................................. 6,966,855 7,781,000

  2. Nuclear Security 101 | National Nuclear Security Administration | (NNSA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security 101 March 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material, technology and expertise or radioactive material. Successful nuclear security relies on the integration of technology, policy, operational concepts and international collaboration to prevent acts of nuclear terrorism. The Basics of Nuclear Security include: Removing or Eliminating Highly Enriched Uranium (HEU) and

  3. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site August 23, 2010 The primary mission of the National Nuclear Security Administration (NNSA) is to maintain the safety, security and effectiveness of the nation's nuclear deterrent through surveillance programs and life extension campaigns. Exercising the skills and capabilities required to accomplish that mission provide the nation with a unique capability to support a wide variety of additional national security missions. To maximize this potential, NNSA

  4. Military implications of global warming. Strategy research project

    SciTech Connect (OSTI)

    Greene, P.E.

    1999-05-20

    The 1998 National Security Strategy repeatedly cites global environmental issues as key to the long-term security of the United States. Similarly, US environmental issues also have important global implications. This paper analyzes current US Policy as it pertains to global warming and climate change. It discusses related economic factors and environmental concerns. It assesses current White House policy as it relates to the US military. It reviews the Department of Defense strategy for energy conservation and reduction of greenhouse gases. Finally, it offers recommendations and options for military involvement to reduce global warming. Global warming and other environmental issues are important to the US military. As the United States leadership in environmental matters encourages global stability, the US military will be able to focus more on readiness and on military training and operations.

  5. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  6. Secure key storage and distribution

    SciTech Connect (OSTI)

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  7. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tools Security Minutes New! SIMP Late Reporting Social Media Email Association Official Use Only (OUO) Majordomo Email List Risks Email Vacating Spaces Reporting Monitors Review and Approval Top of page

  8. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  9. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    References: PERSEC F 5633.33, NNSA Personnel Security Clearance Action Request DOE F ... All SNL Members of the Worksforce granted a DOE Security Clearance are required to obtain ...

  10. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This order cancels DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011, Physical ...

  11. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  12. Asian Energy Security

    SciTech Connect (OSTI)

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  13. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  14. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  15. Technical Security Program - DOE Directives, Delegations, and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  16. Independent Oversight Review, Nevada National Security - May...

    Office of Environmental Management (EM)

    National Security - May 2013 Independent Oversight Review, Nevada National Security - May 2013 May 2013 Review of the Nevada National Security Site Criticality Safety Program ...

  17. DOE - NNSA/NFO -- National Security Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Homeland Security NNSANFO Language Options U.S. DOENNSA - Nevada Field Office Homeland Security The U.S. Department of Energy (DOE) National Nuclear Security Administration ...

  18. Waste Isolation Pilot Plant Transportation Security | Department...

    Office of Environmental Management (EM)

    Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security (2.41 MB) More Documents & Publications Enterprise ...

  19. Safeguards and Security Program - DOE Directives, Delegations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  20. April 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

  1. Secretary Bodman Meets with Global Energy Ministers at the International

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Forum in Qatar | Department of Energy Global Energy Ministers at the International Energy Forum in Qatar Secretary Bodman Meets with Global Energy Ministers at the International Energy Forum in Qatar April 24, 2006 - 10:25am Addthis Bodman emphasizes the need for international cooperation to improve global energy security DOHA, QATAR - U.S. Secretary of Energy Samuel W. Bodman attended the 10th International Energy Forum (IEF) in Doha, Qatar, today to discuss the need for

  2. accountability | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    accountability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  3. transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  4. apm | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    apm NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Contract Award Provides Best

  5. nnss | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nnss NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Contract Award Provides Best

  6. LEU | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    LEU NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... DOE/NNSA Successfully Establishes Uranium Lease and Takeback Program to Support Critical Medical Isotope Production In January 2016,

  7. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD NNSA program strengthens national security from afar The Nuclear Smuggling Detection and Deterrence (NSDD) program is a key component of NNSA's core mission to reduce nuclear threats. The program, part of NNSA's Office of Defense Nuclear Nonproliferation, provides partners tools and training to deter, detect, and investigate smuggling of... NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security

  8. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset

  9. ors | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ors NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  10. David Telles wins NNSA Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    David Telles wins NNSA Security Professional of the Year award May 7, 2009 LOS ALAMOS, New Mexico, May 7, 2009 - David M. Telles, who leads Los Alamos National Laboratory's Vulnerability Analysis Office, received a 2008 National Nuclear Security Administration Security Professional of the Year award. NNSA administrator Tom D'Agostino said, "Our security professionals dedicate themselves to protecting some of the nation's most vital strategic assets, and in so doing, help advance broader

  11. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  12. Secure computing for the 'Everyman'

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure computing for the 'Everyman' Secure computing for the 'Everyman' If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. September 2, 2014 This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information

  13. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  14. contracts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Management, Organizational and Administrative Support Services WASHINGTON, D.C. - The National Nuclear Security ... Environmental Program Services Contract Environmental ...

  15. NNSA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense

  16. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  17. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  18. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  19. Nuclear Safeguards and Security Challenge:

    National Nuclear Security Administration (NNSA)

    Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards

  20. nest | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nest Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management Coordination HQ Emergency Management Team Responding to Emergencies Consequence Management First Responders Operations Render Safe Nuclear Forensics International... Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security Council-sponsored policy initiative that establishes