Powered by Deep Web Technologies
Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Tamper-indicating seals : practices, problems, and standards  

SciTech Connect

Tamper-indicating seals have been used by customs officials for over 7,000 years. Today, seals are widely used to help counter theft, smuggling, sabotage, vandalism, terrorism, and espionage. Despite their antiquity and modern widespread use, however, there remains considerable confusion about seals, as well as a lot of misconceptions, wishful thinking, sloppy terminology, and poor practice. The absence of meaningful norms and standards, together with the surprisingly limited amount of research and development (R&D) in the field of tamper detection, has also hindered the effective use of seals. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has intensively studied tamper-indicating seals for the last 12 years. We have engaged in vulnerability assessments, R&D, consulting, and training for over two dozen United States government agencies and private companies, as well as for the International Atomic Energy Agency (IAEA) and Euratom. The VAT has also analyzed over 200 different types of seals in detail. This paper summarizes some of our conclusions, recommendations, and warnings regarding seals and tamper detection.

Johnston, R. G. (Roger G.)

2003-01-01T23:59:59.000Z

2

Preventing Theft of Anhydrous Ammonia  

E-Print Network (OSTI)

to occur in waves, with thieves striking the same location several times. Thefts have occurred at such unlikely places as refrig- eration systems, underground pipelines and rail cars. However, most criminals steal from above-ground tanks on farms... such as bottles or tanks may be left behind; these pose a risk to anyone who comes across them and handles them. Signs of Theft Evidence of theft includes valves not tightly closed or that seem to have been tampered with, footprints in the soil, and tire...

Smith, David

2004-09-16T23:59:59.000Z

3

TAMPERE UNIVERSITY OF TECHNOLOGY DEPARTMENT OF AUTOMATION  

E-Print Network (OSTI)

TAMPERE UNIVERSITY OF TECHNOLOGY DEPARTMENT OF AUTOMATION An Intelligent Web Service for Operation 2004 Examiner: Prof. Seppo Kuikka #12;2 Abstract TAMPERE UNIVERSITY OF TECHNOLOGY Automation Degree Program Institute of Automation and Control Jaakkola, Veli-Pekka: An Intelligent Web Service for Operation

4

Integrated optical tamper sensor with planar waveguide  

DOE Patents (OSTI)

A monolithic optical tamper sensor, comprising an optical emitter and detector, connected by an optical waveguide and placed into the critical entry plane of an enclosed sensitive region, the tamper sensor having a myriad of scraps of a material optically absorbent at the wavelength of interest, such that when the absorbent material is in place on the waveguide, an unique optical signature can be recorded, but when entry is attempted into the enclosed sensitive region, the scraps of absorbent material will be displaced and the optical/electrical signature of the tamper sensor will change and that change can be recorded.

Carson, R.F.; Casalnuovo, S.A.

1993-01-05T23:59:59.000Z

5

Improving Tamper Detection for Hazardous Waste Security  

SciTech Connect

Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them.

Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

2003-02-26T23:59:59.000Z

6

The relationship between cell phone use and identity theft.  

E-Print Network (OSTI)

?? The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a… (more)

Saunders, Lewis O.

2014-01-01T23:59:59.000Z

7

An Updated Assessement of Copper Wire Thefts from Electric Utilities...  

Energy Savers (EERE)

An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 The U.S....

8

Reusable tamper-indicating security seal  

SciTech Connect

A reusable tamper-indicating mechanical security seal for use in safeguarding nuclear material has been developed. The high-security seal displays an unpredictable, randomly selected, five-digit code each time it is used. This five digit code serves the same purpose that the serial number does for conventional non-reusable seals - a unique identifier for each use or application. The newly developed reusable seal is completely enclosed within a seamless, tamper-indicating, plastic jacket. The jacket is designed to reveal any attempts to penetrate, section or to chemically remove and replace with a counterfeit for surreptitious purposes.

Ryan, M.J.

1981-01-01T23:59:59.000Z

9

Developing Novel Approaches to Tamper & Intrusion Detection - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Developing Novel Approaches to Developing Novel Approaches to Tamper & Intrusion Detection VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Tamper & Intrusion Detection Rapid Sampling from Sealed Containers Demo video Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers

10

Common Myths about Tamper Indicating Seals - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Common Myths about Tamper Common Myths about Tamper Indicating Seals VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

11

Measuring Identity Theft at Top Banks (Version 1.5)  

E-Print Network (OSTI)

Ryan Singel, Bank of America, HSBC Most Prone to I.D. Theft,Ryan Singel, Bank of America, HSBC Most Prone to I.D. Theft,problems. An unidentified HSBC bank official was quoted by

Hoofnagle, Chris

2008-01-01T23:59:59.000Z

12

Improving tamper detection for hazardous waste security  

SciTech Connect

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

13

Bike Theft Prevention Bicycle theft is an on-going problem. If you haven't already, you should  

E-Print Network (OSTI)

Bike Theft Prevention Bicycle theft is an on-going problem. If you haven't already, you should record the make, model and serial number of your bicycle and store this information in a safe place. It registered to the owner from New York to California. While it's not possible to make your bicycle 100% theft

Qian, Ning

14

Medical Identity Theft in the Emergency Department: Awareness is Crucial  

E-Print Network (OSTI)

S. Patient identity fraud in the emergency department.patient-identity-fraud-emergency- department.html. Accessedidentity theft and insurance fraud. Case 2 A 19-year-old

Mancini, Michelino

2014-01-01T23:59:59.000Z

15

Identity Theft: What You Need To Know | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Identity Theft: What You Need To Know Identity Theft: What You Need To Know Identity Theft: What You Need To Know December 17, 2013 9:00AM to 11:00AM EST Registration link: CHRIS 002664/0001 Course Type: Classroom/Auditorium Course Location: Germantown Auditorium Course Description: The Office of the Chief Information Officer (OCIO) is pleased to present an informative session to learn about identity theft and how to detect and defend against it. Steven Toporoff, (Attorney, Identity Protection Program Coordinator), and Peter Miller (Chief Privacy Officer) from the Federal Trade Commission will provide expert insight on such topics as reducing the risk, prevention, and steps to take should you encounter identity theft. Audience: The Privacy Awareness Training Event is available for all Headquarters DOE Federal employees and contractors.

16

Tamper-indicating device having a glass body  

DOE Patents (OSTI)

A tamper-indicating device is described. The device has a first glass body member and a second glass body member that are attached to each other through a hasp. The glass body members of the device can be tempered. The body members can be configured with hollow volumes into which powders, microparticles, liquids, gels, or combinations thereof are sealed. The choice, the amount, and the location of these materials can produce a visible, band pattern to provide each body member with a unique fingerprint identifier, which makes it extremely difficult to repair or replace once it is damaged in order to avoid tamper detection.

Johnston, Roger G. (Los Alamos, NM); Garcia, Anthony R. E. (Espanola, NM)

2003-04-29T23:59:59.000Z

17

An Updated Assessement of Copper Wire Thefts from Electric Utilities -  

NLE Websites -- All DOE Office Websites (Extended Search)

An Updated Assessement of Copper Wire Thefts from Electric An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 The U.S. Department of Energy (DOE), Office of Electricity Delivery and Energy Reliability monitors changes, threats, and risks to the energy infrastructure in the United States. This report updates a previously published report on copper wire theft. The combined efforts of electric utilities, lawmakers, scrap metal dealers, and local law enforcement have succeeded in reducing the problem. Updated Assessment-Copper-Final October 2010.pdf More Documents & Publications Investigation Letter Report: I11IG002 Semiannual Report to Congress: for the first half of Fiscal Year (FY) 1998 Energy Infrastructure Events and Expansions Year-in-Review 2010

18

An Updated Assessment of Copper Wire Thefts from Electric Utilities...  

Energy Savers (EERE)

of this report that these three sources reasonably represent copper theft, if not in terms of absolute numbers, at least in terms of trends. It is significant that although...

19

A study of hand tamper design for compaction of soils  

E-Print Network (OSTI)

Determination Standard Oven Dry Method versus Frying Pan Method Grain Size Distribution Curve Centerville Sand 34 Tamper Comparison Chart: Dry Density after 200 Blows per Square Foot of Layer Dry Density versus Compactive Effort Curve on 3. 0 Inch Square... assumed that the degree of compaction in a soil is dirertly proportional to the weight, height of drop, and number of blows per volume, and inversely propor- tional to the impact face area and the thickness of layer. While all previous tests appear...

McDonough, Brian

1961-01-01T23:59:59.000Z

20

Guardians at the Gates of Hell Estimating the Risk of Nuclear Theft and Terrorism  

E-Print Network (OSTI)

that pose the highest-priority risks of nuclear theft, and to evaluate policy approaches to strengtheningGuardians at the Gates of Hell Estimating the Risk of Nuclear Theft and Terrorism ­ and Identifying the Highest-Priority Risks of Nuclear Theft by Matthew Bunn SB and SM, Political Science, MIT, 1985 SUBMITTED

de Weck, Olivier L.

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

From the Editors fraud and identity theft. As a result,  

E-Print Network (OSTI)

From the Editors fraud and identity theft. As a result, we're getting nowhere. Today's tech- nology fraud, a criminal ob- tains information about a victim and uses this information to impersonate fiscally irresponsible actions to the victim. Time is money, so dealing with identity fraud and identity

Schneider, Fred B.

22

Reversible fragile watermarking for locating tampered blocks in 2D vector maps  

Science Journals Connector (OSTI)

For 2D vector maps, obtaining good tamper localization performance and original content recovery with existing reversible fragile watermarking schemes is a technically challenging problem. Using an improved reversible watermarking method and a fragile ... Keywords: 2D vector map, Authentication, Fragile watermarking, Reversible data hiding, Tamper localization

Nana Wang; Chaoguang Men

2013-12-01T23:59:59.000Z

23

Impact of Copper Thefts on the Department of Energy (OIG Case No.: I11IG002)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 17, 2011 August 17, 2011 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Impact of Copper Thefts on the Department of Energy (OIG Case No.: I11IG002) A series of news articles during the last several months have reported increased thefts of copper nationally, including several that have interrupted electrical distribution and telephone service in communities across the country. These thefts have also adversely impacted new construction projects, irrigation systems and other infrastructure projects. In fact, the Federal Bureau of Investigation reported in an unclassified intelligence assessment that copper thefts threaten the critical infrastructure of the United States.

24

Identity Theft --Appendix 2 Page Page 1 of 3 IDENTITY FRAUD VICTIM WORKSHEET  

E-Print Network (OSTI)

Identity Theft -- Appendix 2 Page Page 1 of 3 IDENTITY FRAUD VICTIM WORKSHEET Credit Bureaus -- Report Fraud Bureau: Equifax Phone Number: 1-800-525-6285 Date Contacted

Oklahoma, University of

25

A Passive Tamper Indicating Enclosure For Use Within A Nuclear Weapons Monitoring Regime  

SciTech Connect

AWE and PNNL are engaged in a technical collaboration investigating techniques to enhance continuity of knowledge over Treaty Accountable Items, with emphasis on a verified nuclear weapons dismantlement process. Tamper Indicating Enclosures (TIE) will likely be deployed as part of a chain of custody regime to indicate an unauthorised attempt to access a Treaty Accountable Item, or secure authenticated monitoring equipment. In 2011, the collaboration presented a paper at the INMM annual conference held in Palm Desert, CA titled “Passive Tamper Indicating Enclosures Incorporating Embedded Optical Fibre”, which discussed the concept of integrating optical fibres into TIEs for use as a passive tamper indicating mechanism. This paper provides an update on the Fibre Optic based TIE and introduces a second passive TIE concept based on the use of Poly(Methyl MethAcrylate) (PMMA). Concepts relating to deployment, tamper indication, and unique identification will be discussed.

White, Helen; Tanner, Jennifer E.; Allen, Keir; Benz, Jacob M.; McOmish, Sarah; Simmons, Kevin L.

2012-10-01T23:59:59.000Z

26

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century  

Science Journals Connector (OSTI)

The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States ... Keywords: Security

Christopher Burgess; Richard Power

2008-03-01T23:59:59.000Z

27

Tamper to delay motion and decrease ionization of a sample during short pulse x-ray imaging  

DOE Patents (OSTI)

A system for x-ray imaging of a small sample comprising positioning a tamper so that it is operatively connected to the sample, directing short intense x-ray pulses onto the tamper and the sample, and detecting an image from the sample. The tamper delays the explosive motion of the sample during irradiation by the short intense x-ray pulses, thereby extending the time to obtain an x-ray image of the original structure of the sample.

London, Richard A. (Orinda, CA); Szoke; Abraham (Fremont, CA), Hau-Riege; Stefan P. (Fremont, CA), Chapman; Henry N. (Livermore, CA)

2007-06-26T23:59:59.000Z

28

Tamper indicating and sensing optical-based smart structures  

SciTech Connect

This paper has presented an overview of the type of optical-based structures that can be designed and constructed. These smart structures are capable of responding to their environment. The examples given represent a modest sampling of the complexity that can be achieved in both design and practice. Tamper-indicating containers and smart, sensing windows demonstrate just a few of the applications. We have shown that optical-based smart structures can be made multifunctional with the sensing built in. The next generation smart structure will combine the sensing functionality of these optical-based smart structures with other sensors such as piezoelectrics and electro-rheological fluids to not only be able to respond to the environment, but to adapt to it as well. An example of functionality in this regime would be a piezosensor that senses pressure changes (e.g., shock waves), which then causes an electro-rheological fluid to change viscosity. A fiber sensor located in or near the electro-rheological fluid senses the stiffness change and sends a signal through a feedback loop back to the piezosensor for additional adjustments to the electro-rheological fluid.

Sliva, P.; Anheier, N.C.; Gordon, N.R.; Simmons, K.L.; Stahl, K.A.; Undem, H.A.

1995-05-01T23:59:59.000Z

29

Investigation of natural gas theft by magnetic remanence mapping  

Science Journals Connector (OSTI)

Abstract Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples.

Zsolt Dobó; Helga Kovács; Pál Tóth; Árpád B. Palotás

2014-01-01T23:59:59.000Z

30

15 July 1999 M. Oreglia, EPS Tampere, Parallel 7 1 What to do if there are too many people on the  

E-Print Network (OSTI)

15 July 1999 M. Oreglia, EPS Tampere, Parallel 7 1 (at LEP) or What to do if there are too many, EPS Tampere, Parallel 7 2 Higgs Bosons at LEP · In Minimal Standard Model: ­ production via ­ direct- ZHee + 00- Ahee + 0- hffee + #12;15 July 1999 M. Oreglia, EPS Tampere, Parallel 7 3 Fermiophobia

31

RESEARCH AT THE AUTOMATION AND CONTROL INSTITUTE OF TAMPERE UNIVERSITY OF TECHNOLOGY  

E-Print Network (OSTI)

22 5 RESEARCH AT THE AUTOMATION AND CONTROL INSTITUTE OF TAMPERE UNIVERSITY OF TECHNOLOGY should try to develop new solutions, methods and tools to improve the level of automation of the Finnish information technologies in automation. More than 50 % of the diploma theses (M.Sc. theses) are done

32

Geographies of identity theft in the u.s.: understanding spatial and demographic patterns, 2002-2006  

E-Print Network (OSTI)

result, there are numerous attempts at defining what is (and is not) identity theft. Researchers generally agree that identity theft involves the fraudulent misuse of personal information for illegal activity and unauthorized personal gain, but some... documents issued, Social Security card issued/ forged, Unspecified Loan Fraud 6% (9,712) 5% (12,301) - Business/ Personal/ Student loan, Auto loan, Real estate loan, Unspecified Other Identity Theft 16% (25,903) 24% (59,048) - Illegal...

Lane, Gina W.

2009-05-15T23:59:59.000Z

33

Setting fires, false alarms, or vandalizing fire protection equipment is illegal. Any person found to be participating in these activities will be prosecuted to the full extent of the law and/or disciplined through the University's disciplinary procedures  

E-Print Network (OSTI)

Setting fires, false alarms, or vandalizing fire protection equipment is illegal. Any person found University fire safety equipment should contact the Campus University Police or Security. FIRES What should I do if I discover a fire? ACTIVATE THE FIRE ALARM SYSTEM by pulling one of the pull stations that re

Fernandez, Eduardo

34

Setting fires, false alarms, or vandalizing fire protection equipment is illegal. Any person found to be participating in these activities will be prosecuted to the full extent of the law and/or disciplined through the University's disciplinary procedures  

E-Print Network (OSTI)

Setting fires, false alarms, or vandalizing fire protection equipment is illegal. Any person found University fire safety equipment should contact the Campus University Police or Security. FIRES What should I do if I discover a fire? · ACTIVATE THE FIRE ALARM SYSTEM by pulling one of the nearest pull stations

Fernandez, Eduardo

35

October 28, 2009, Fraud and Theft in the Information Age - Companion Book  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fraud and Theft in the Information Age Fraud and Theft in the Information Age Frank W. Abagnale Author, Lecturer, Consultant Office of Health, Safety and Security Visiting Speaker Program Event October 28, 2009 Washington, DC Office of Health, Safety and Security ; shareholders and stakeholders. The HSS Focus Group HSS believes an Glenn S. Podonsky The Office of Health, Safety and Security (HSS) is the Department of Energy's (DOE) corporate organization responsible for health, safety, environment, and security providing corporate leadership and strategic vision to coordinate and integrate these vital programs. HSS is responsible for policy development and technical assistance; corporate analysis; corporate safety and security programs; education and training; complex-wide independent oversight; and enforcement. The Chief Health,

36

Diffusion of the Texas Cooperative Extension's horse theft awareness and prevention initiative  

E-Print Network (OSTI)

DIFFUSION OF THE TEXAS COOPERATIVE EXTENSION?S HORSE THEFT AWARENESS AND PREVENTION INITIATIVE A Record of Study by PATTRICK LEE SWAIM JR. Submitted to the Office of Graduate Studies of Texas A&M University... INITIATIVE A Record of Study by PATTRICK LEE SWAIM JR. Submitted to Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF EDUCATION Approved by: Co...

Swaim, Pattrick Lee, Jr.

2006-04-12T23:59:59.000Z

37

Time-Domain Reflectometry for Tamper Indication in Unattended Monitoring Systems for Safeguards  

SciTech Connect

The International Atomic Energy Agency (IAEA) continues to expand its use of unattended, remotely monitored measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. Pacific Northwest National Laboratory (PNNL) leads a collaboration that is exploring various tamper-indicating (TI) measures that could help to address some of the long-standing detector and data-transmission authentication challenges with IAEA’s unattended systems. PNNL is investigating the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory gold standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s progress and preliminary findings from the first year of the study, and describes the path forward.

Tedeschi, Jonathan R.; Smith, Leon E.; Moore, David E.; Sheen, David M.; Conrad, Ryan C.

2014-12-17T23:59:59.000Z

38

Smart Phone Users BEWARE!! The NYPD is reporting an increase in the theft of electronic devices from  

E-Print Network (OSTI)

Smart Phone Users BEWARE!! The NYPD is reporting an increase in the theft of electronic devices, listening to music or even texting while walking. · Keep your smart phone on your person / coat or jacket. Don't display it when not in use. Use a hands free device. · Change the color of your earphones from

Papavasiliou, F. Nina

39

The Attractiveness of Materials in Advanced Nuclear Fuel Cycles for Various Proliferation and Theft Scenarios  

SciTech Connect

This paper is an extension to earlier studies1,2 that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no “silver bullet” has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of "attractiveness levels" that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities.3 The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

Bathke, C. G.; Wallace, R. K.; Ireland, J. R.; Johnson, M. W.; Hase, Kevin R.; Jarvinen, G. D.; Ebbinghaus, B. B.; Sleaford, Brad W.; Bradley, Keith S.; Collins, Brian A.; Smith, Brian W.; Prichard, Andrew W.

2010-09-01T23:59:59.000Z

40

MIE -H&S -04 -Electrical Under no circumstances is anyone to tamper with, or work with exposed wiring in the  

E-Print Network (OSTI)

MIE - H&S - 04 - Electrical ELECTRICAL Under no circumstances is anyone to tamper with, or work legislation, all electrical equipment must be suitable for its use and certified by: (i) The Canadian Standards Association (CSA), or (ii) The Electrical Safety Authority (ESA). The Ontario Electrical Safety

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Integrated Dynamic Electron Solutions, Inc. | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TrakLok Corporation TrakLok Corporation Oak Ridge National Laboratory 463 likes TrakLok, Inc., based in Knoxville, Tenn., intends to use an Oak Ridge National Laboratory (ORNL)-developed, technology for tagging, tracking, locating and communicating with cargo containers and trailers in transit. The ORNL technology provides an avenue to meet increasing requirements for shipping containers to be "smart boxes" that can be tracked electronically. TrakLok uses GPS technology and satellite communications as part of its tracking and warning capability and international container locking technology to protect against container tampering, theft, vandalism and smuggling. Shipments can be tracked through a web-accessible, information technology-based global tracking system to provide real time visibility of

42

DEVELOPMENT OF A TAMPER RESISTANT/INDICATING AEROSOL COLLECTION SYSTEM FOR ENVIRONMENTAL SAMPLING AT BULK HANDLING FACILITIES  

SciTech Connect

Environmental sampling has become a key component of International Atomic Energy Agency (IAEA) safeguards approaches since its approval for use in 1996. Environmental sampling supports the IAEA's mission of drawing conclusions concerning the absence of undeclared nuclear material or nuclear activities in a Nation State. Swipe sampling is the most commonly used method for the collection of environmental samples from bulk handling facilities. However, augmenting swipe samples with an air monitoring system, which could continuously draw samples from the environment of bulk handling facilities, could improve the possibility of the detection of undeclared activities. Continuous sampling offers the opportunity to collect airborne materials before they settle onto surfaces which can be decontaminated, taken into existing duct work, filtered by plant ventilation, or escape via alternate pathways (i.e. drains, doors). Researchers at the Savannah River National Laboratory and Oak Ridge National Laboratory have been working to further develop an aerosol collection technology that could be installed at IAEA safeguarded bulk handling facilities. The addition of this technology may reduce the number of IAEA inspector visits required to effectively collect samples. The principal sample collection device is a patented Aerosol Contaminant Extractor (ACE) which utilizes electrostatic precipitation principles to deposit particulates onto selected substrates. Recent work has focused on comparing traditional swipe sampling to samples collected via an ACE system, and incorporating tamper resistant and tamper indicating (TRI) technologies into the ACE system. Development of a TRI-ACE system would allow collection of samples at uranium/plutonium bulk handling facilities in a manner that ensures sample integrity and could be an important addition to the international nuclear safeguards inspector's toolkit. This work was supported by the Next Generation Safeguards Initiative (NGSI), Office of Nonproliferation and International Security (NIS), National Nuclear Security Administration (NNSA).

Sexton, L.

2012-06-06T23:59:59.000Z

43

Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage  

SciTech Connect

Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

2011-10-05T23:59:59.000Z

44

Open literature review of threats including sabotage and theft of fissile material transport in Japan.  

SciTech Connect

This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

2005-06-01T23:59:59.000Z

45

Microsoft Word - AMI White paper final 013108 _2_.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

* Remote turn on turn off operations * Load limiting for "bad pay" or demand response purposes * Energy prepayment * Power quality monitoring * Tamper and energy theft...

46

PSI # Date Time Location Incident Description Disposition 4341 9/2/2011 8:00 Blue Ridge Bicycle Theft Norco Mountain bike BPD notified  

E-Print Network (OSTI)

PSI # Date Time Location Incident Description Disposition 4341 9/2/2011 8:00 Blue Ridge Bicycle Four or more citations received Fine issued 4353 9/8/2011 16:00 Elizabeth Rogers Bicycle Theft Bluish Green bicycle BPD notified 4354 9/9/2011 13:49 Short St Hair Salon Criminal Damage Graffiti on the rear

Baltisberger, Jay H.

47

Tamper resistant magnetic stripes  

DOE Patents (OSTI)

This invention relates to a magnetic stripe comprising a medium in which magnetized particles are suspended and in which the encoded information is recorded by actual physical rotation or alignment of the previously magnetized particles within the flux reversals of the stripe which are 180.degree. opposed in their magnetic polarity. The magnetized particles are suspended in a medium which is solid, or physically rigid, at ambient temperatures but which at moderately elevated temperatures, such as 40.degree. C., is thinable to a viscosity permissive of rotation of the particles therein under applications of moderate external magnetic field strengths within acceptable time limits.

Naylor, Richard Brian (Albuquerque, NM); Sharp, Donald J. (Albuquerque, NM)

1999-01-01T23:59:59.000Z

48

Crime Alert: Theft of Cell Phone near Campus On November 8th, at about 4:00 pm, a student was walking on Blaine St, near Canyon Crest Drive  

E-Print Network (OSTI)

Crime Alert: Theft of Cell Phone near Campus On November 8th, at about 4:00 pm, a student was walking on Blaine St, near Canyon Crest Drive listening to his iPhone on a pair of headphones. A subject approached him, asked to use his iPhone and when the victim refused, the suspect grabbed the phone and ran

49

PSI # Date Time Location Incident Description Disposition 4705 4/1/2012 14:20 Blue Ridge Theft By Unlawful Taking Blue Northwoods Bel Aire bicycle stolen BPD Notified  

E-Print Network (OSTI)

By Unlawful Taking Blue Northwoods Bel Aire bicycle stolen BPD Notified 4706 4/2/2012 9:52 Kentucky Hall/2/2012 12:33 Dana Hall Theft By Unlawful Taking Red and silver bicycle stolen BPD Notified 4708 4/2/2012 17

Baltisberger, Jay H.

50

Laser speckle photography for surface tampering detection  

E-Print Network (OSTI)

It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To address this challenge, we introduce a new imaging ...

Shih, YiChang

51

Laser speckle photography for surface tampering detection  

E-Print Network (OSTI)

It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To address this challenge, we introduce a new imaging ...

Shih, YiChang

2012-01-01T23:59:59.000Z

52

The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'06) 1-4244-0330-8/06/$20.002006 IEEE  

E-Print Network (OSTI)

University of Technology Tampere, Finland Tampere, Finland Tampere, Finland Tampere, Finland ABSTRACT A novel

Gabbouj, Moncef

53

What's It Going To Be Then, Eh? Youth Violence, Free Will, and the Creative Cycle in A Clockwork Orange  

E-Print Network (OSTI)

can be done to re-channel them. (Christle, Nelson and Jolivette) 4 The Story A group of boys, led by a charismatic Alex, terrorize their city with an unabated string of violent crime. Brutal physical attacks, rape, theft, vandalism... of the scientists and politicians promoting the Lodovico Technique. Before Alex’s capture and incarceration, source lighting (streetlights, spill from the Korova Milk Bar, headlights etc.) and shadows will be used to keep the criminal activity of the droogs...

Evans, Cynthia Louise

2014-05-31T23:59:59.000Z

54

The 17th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'06) 1-4244-0330-8/06/$20.002006 IEEE  

E-Print Network (OSTI)

, Finland Tampere, Finland Tampere, Finland Tampere, Finland ABSTRACT This paper introduces a method

Gabbouj, Moncef

55

Tampere International Center for Signal Processing TICSP Series #47  

E-Print Network (OSTI)

at Lappeenranta University of Technology. In the mid 1980s you made another visit abroad. I spent the autumn

Gabbouj, Moncef

56

It's More Than Just Your Wallet... Identity Theft  

E-Print Network (OSTI)

· Consequences include: ­ Loss of savings/investments ­ Damaged credit ­ Tax confusion #12 wreak havoc with your finances, credit history, health insurance, and reputa9on data ­ Lack of credit-checking ­ Pre-occupied families · Synthe9c Iden99es: ­ False

Pilyugin, Sergei S.

57

Horse Theft Awareness and Prevention - Identification of Horses  

E-Print Network (OSTI)

of advertising. Permanent Identif_ication of Horses L-5211 7-98 Pete Gibbs, Leman H. Wall and Doug Householder* *Professor and Extension Horse Specialist, Extension Assistant-Animal Science/4-H and Professor and Extension Horse Spe- cialist; The Texas A...

Gibbs, Pete G.; Wall, Leman H.; Householder, Doug

1998-08-12T23:59:59.000Z

58

Measuring Identity Theft at Top Banks (Version 1.0)  

E-Print Network (OSTI)

deposits, the data show that HSBC has a higher incidence ofTARGET SEARS DISH NETWORK HSBC WALMART DELL COMPUTER

Hoofnagle, Chris

2008-01-01T23:59:59.000Z

59

Data:C5fb4943-64b9-4054-abd3-85968efe96ae | Open Energy Information  

Open Energy Info (EERE)

fb4943-64b9-4054-abd3-85968efe96ae fb4943-64b9-4054-abd3-85968efe96ae No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Kerrville Public Utility Board Effective date: 2000/01/01 End date if known: Rate name: tampering charge Sector: Commercial Description: made for unauthorized reconnection or other tampering with KPUB metering facilities or any theft of electric service by any person on customer's premises or any evidence thereof by whomsoever done at customer's premises. An additional charge for any costs of repairs and/or replacement of damaged facilities, installing protective facilities, and the estimated amount of electric service not recorded by the meter, if any, is also made.

60

Safeguards Summary Event List (SSEL), January 1, 1990--December 31, 1996, Vol. 2, Rev. 5  

SciTech Connect

The Safeguards Summary Event List (SSEL), Vol. 2, Rev. 5, provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC) which occurred and were reported from January 1, 1990, through December 31, 1996. Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of Bomb-related, Intrusion, Missing and/or Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms, Radiological Sabotage, Nonradiological Sabotage, and Miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels.

NONE

1997-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Safeguards summary event list (SSEL), January 1, 1990--December 31, 1995  

SciTech Connect

The Safeguards Summary Event List (SSEL), Vol. 2, Rev. 4, provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the U.S. Nuclear Regulatory Commission (NRC) which occurred and were reported from January 1, 1990, rough December 31, 1995. Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of Bomb-related, Intrusion, Missing and/or Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms, Radiological Sabotage, Nonradiological Sabotage, and Miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels.

NONE

1996-07-01T23:59:59.000Z

62

Microsoft Word - DUR 2008-final.doc  

Office of Legacy Management (LM)

Durango, Colorado Durango, Colorado Page 4-1 4.0 Durango, Colorado, Disposal Site 4.1 Compliance Summary The Durango, Colorado, Uranium Mill Tailings Radiation Control Act (UMTRCA) Title I Disposal Site was inspected on May 28, 2008. The disposal cell and all associated surface water diversion and drainage structures were in good condition and functioning as designed. The water level in the disposal cell has dropped which satisfies criteria for permanent closure of the transient drainage water collection and treatment system. However, DOE is evaluating an increase in the downgradient uranium concentration before decommissioning the treatment system. Vandalism, primarily theft and damage to signs, continues at the site. The bases of perimeter signs P41 and P44 have been undercut by erosion but remain stable. Infestations of

63

Vertically and Horizontally Mounted Wind Mills : Wind Energy Production in Tampere University of Applied Sciences.  

E-Print Network (OSTI)

??The purpose of this thesis was to gather information about vertical and horizontal wind mills and to complete a research on wind power production by… (more)

Evdokimova, Ekaterina

2013-01-01T23:59:59.000Z

64

NTL Detection of Electricity Theft and Abnormalities for Large Power Consumers In TNB Malaysia  

E-Print Network (OSTI)

consumption characteristics i.e. load profiles of LPC customers, which helps to expose abnormal consumption is recorded based on half-hourly intervals. The technique proposed in this paper correlates the half-hourly

Ducatelle, Frederick

65

Theft of the Mind: An Innovative Approach to Plagiarism and Copyright Education  

E-Print Network (OSTI)

and standards of what needs to be cited. Students can thus come to appreciate that they cannot be complacent in their plagiarism education after completing that initial tutorial in freshman English or reading and accepting the university?s honor code during... were concluded. In this lesson, students critiqued a popular academic integrity video tutorial??The Dr. Dhil Show??that contains several factual mistakes concerning the de#31;ni- tion of plagiarism (Mezzocchi 2004). By identifying several...

Clement, Gail; Brenenson, Stephanie

2013-01-01T23:59:59.000Z

66

The development of a curb valve flow meter for gas theft detection  

E-Print Network (OSTI)

As the supply of natural gas continues to dwindle, and government decontrol of pricing progresses, the rising cost of this essential natural resource will drive more individuals to consider various forms of pilferage as a ...

Fitzgerald, Kevin Francis

1984-01-01T23:59:59.000Z

67

Government Documents Interest Group (GDIG) From Global Warming to Identity Theft  

E-Print Network (OSTI)

· Advanced Search and Quick Search at http://www.ntis.gov/search/index.aspx · Search the National Technical limit by range of years ­ Search Help ­ Improved Advanced & Basic Search ­ Search by Product Number ­ Technical Report Number #12;#12;NTIS Database Advanced Search #12;Category List on Next Screen Search: (by

Nair, Sankar

68

Cognitive Radio will revolutionize American transportation  

ScienceCinema (OSTI)

Cognitive Radio will revolutionize American transportation. Through smart technology, it will anticipate user needs; detect available bandwidths and frequencies then seamlessly connect vehicles, infrastructures, and consumer devices; and it will support the Department of Transportation IntelliDrive Program, helping researchers, auto manufacturers, and Federal and State officials advance the connectivity of US transportation systems for improved safety, mobility, and environmental conditions. Using cognitive radio, a commercial vehicle will know its driver, onboard freight and destination route. Drivers will save time and resources communicating with automatic toll booths and know ahead of time whether to stop at a weigh station or keep rolling. At accident scenes, cognitive radio sensors on freight and transportation modes can alert emergency personnel and measure on-site, real-time conditions such as a chemical leak. The sensors will connect freight to industry, relaying shipment conditions and new delivery schedules. For industry or military purposes, cognitive radio will enable real-time freight tracking around the globe and its sensory technology can help prevent cargo theft or tampering by alerting shipper and receiver if freight is tampered with while en route. For the average consumer, a vehicle will tailor the transportation experience to the passenger such as delivering age-appropriate movies via satellite. Cognitive radio will enhance transportation safety by continually sensing what is important to the user adapting to its environment and incoming information, and proposing solutions that improve mobility and quality of life.

None

2013-12-06T23:59:59.000Z

69

Cognitive Radio will revolutionize American transportation  

SciTech Connect

Cognitive Radio will revolutionize American transportation. Through smart technology, it will anticipate user needs; detect available bandwidths and frequencies then seamlessly connect vehicles, infrastructures, and consumer devices; and it will support the Department of Transportation IntelliDrive Program, helping researchers, auto manufacturers, and Federal and State officials advance the connectivity of US transportation systems for improved safety, mobility, and environmental conditions. Using cognitive radio, a commercial vehicle will know its driver, onboard freight and destination route. Drivers will save time and resources communicating with automatic toll booths and know ahead of time whether to stop at a weigh station or keep rolling. At accident scenes, cognitive radio sensors on freight and transportation modes can alert emergency personnel and measure on-site, real-time conditions such as a chemical leak. The sensors will connect freight to industry, relaying shipment conditions and new delivery schedules. For industry or military purposes, cognitive radio will enable real-time freight tracking around the globe and its sensory technology can help prevent cargo theft or tampering by alerting shipper and receiver if freight is tampered with while en route. For the average consumer, a vehicle will tailor the transportation experience to the passenger such as delivering age-appropriate movies via satellite. Cognitive radio will enhance transportation safety by continually sensing what is important to the user adapting to its environment and incoming information, and proposing solutions that improve mobility and quality of life.

None

2013-07-22T23:59:59.000Z

70

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones Robert Templeman, Zahid Rahman, David Crandall, Apu Kapadia  

E-Print Network (OSTI)

monitors. Figure 1 illustrates how PlaceRaider can use images captured surreptitiously during normal use, information on computer monitors, and personally identifiable information). Through two human subject studies

Menczer, Filippo

71

Proc. of the 11th Int. Conference on Digital Audio Effects (DAFx-08), Espoo, Finland, September 1-4, 2008  

E-Print Network (OSTI)

Proc. of the 11th Int. Conference on Digital Audio Effects (DAFx-08), Espoo, Finland, September 1 Tampere University of Technology Tampere, Finland annamaria.mesaros@tut.fi Tuomas Virtanen, Dept. of Signal Processing Tampere University of Technology Tampere, Finland tuomas.virtanen@tut.fi ABSTRACT

Virtanen, Tuomas

72

Crime Witness  

NLE Websites -- All DOE Office Websites (Extended Search)

Witness, watch for: shooting at insulators, transmission lines, transmission towers or substation equipment; dumping any waste or material on BPA property; vandalizing BPA...

73

Chapter 10 Health and Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission facilities can also become a target for vandalism, sabotage, and terrorism. BPA designs its facilities to meet safety requirements to prevent or reduce these risks....

74

MediaWiki:Deletereason-dropdown | Open Energy Information  

Open Energy Info (EERE)

Edit History Facebook icon Twitter icon MediaWiki:Deletereason-dropdown Jump to: navigation, search Common delete reasons Author request Copyright violation Vandalism Retrieved...

75

Neutral Interface for Assembly and Manufacturing Related Knowledge Exchange in  

E-Print Network (OSTI)

Environment Minna Lanz, Roberto Rodriguez, Pasi Luostarinen, Reijo Tuokko Tampere University of Technology, Department of Production Engineering, P.O.Box 589, 33101 Tampere, Finland {minna.lanz,roberto.rodriguez,pasi.luostarinen

Paris-Sud XI, Université de

76

Method of intrinsic marking  

DOE Patents (OSTI)

A method of pulsed laser intrinsic marking can provide a unique identifier to detect tampering or counterfeiting.

Adams, David P; McDonald, Joel Patrick; Jared, Bradley Howell; Hodges, V. Carter; Hirschfeld, Deidre; Blair, Dianna S

2014-04-01T23:59:59.000Z

77

On the Difficulty of Protecting Private Keys in Software Environments  

E-Print Network (OSTI)

and not ubiquitous at this time. From a different standpoint, the tamper-resistant device could have a surreptitious

Kwon, Taekyoung

78

Integrating Automation Design Information with XML and Web Services Mika Viinikkala  

E-Print Network (OSTI)

Integrating Automation Design Information with XML and Web Services Mika Viinikkala Tampere University of Technology, Institute of Automation and Control, P.O. Box 692, 33101 Tampere Tel. +358 3 3115, Institute of Automation and Control, P.O. Box 692, 33101 Tampere Tel. +358 3 3115 3557, Fax. +358 3 3115

79

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, 2nd edition  

Science Journals Connector (OSTI)

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance ...

Anton Chuvakin; Branden R. Williams

2009-12-01T23:59:59.000Z

80

UNIVERSITY POLICE DEPARTMENT Interoffice Memorandum 10-016  

E-Print Network (OSTI)

: · Auto Theft Detail · Santa Margarita Ecological Preserve and Sky Oaks Marijuana Patrol · RATT Larceny 53 0 53 139 Motor Vehicle Theft 5 0 5 9 Total 83 0 83 199 Alarm /Access Control Incidents Feb 2010

Ponce, V. Miguel

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

How to (And How Not to) Store and Transport Pesticides  

E-Print Network (OSTI)

;#12;Site Security · Theft reports during the past year: Lee, Palm Beach, Martin, Hendry, and Manatee

Watson, Craig A.

82

E-Print Network 3.0 - assistive technologies Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Source: Tampere University of Technology, Automation and Control Institute Collection: Energy Storage, Conversion and Utilization Page: << < 1 2 3 4 5 > >> Page: << < 1 2 3 4 5 >...

83

Undergraduate Coordinator: Dr. Jim Leary  

E-Print Network (OSTI)

. of Environmental Regulation Environmental Affairs Consultants Frito Lay Jet Propulsion Laboratory Johnson, develop new biofuels, design biodegradable or tamper-resistant packages, explore agriculture for space

Watson, Craig A.

84

E-Print Network 3.0 - ahlstrom pyroflow pcfb Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

for: ahlstrom pyroflow pcfb Page: << < 1 2 3 4 5 > >> 1 Proc. EUSIPCO, Tampere, Finland, September 2000. ARE NONUNIFORM PRINCIPAL COMPONENT Summary: @systems.caltech.edu,...

85

Improved Classification of Alzheimer's Disease Data via Removal of Nuisance Variability  

E-Print Network (OSTI)

Initiative 1 VTT Technical Research Centre of Finland,Tampere, Finland, 2 Department ofUniversity of Eastern Finland, Kuopio, Finland, 3 Department

Koikkalainen, Juha; Polonen, Harri; Mattila, Jussi; van Gils, Mark; Soininen, Hilkka; Lotjonen, Jyrki

2012-01-01T23:59:59.000Z

86

Energy Efficiency - Assessment and Analysis of Energy Consumption at TAMK Kuntokatu 3 Campus.  

E-Print Network (OSTI)

??The energy efficiency assessment, implemented at Tampere University of Applied Sciences, Kuntokatu 3 campus, investigated the efficiency performance of the campus buildings. Facility Assessment is… (more)

Emuraishe, Irikefe

2012-01-01T23:59:59.000Z

87

Security API analysis with the spi-calculus and the ProVerif tool  

E-Print Network (OSTI)

Security API analysis with the spi-calculus and the ProVerif tool Technical Report copyright©2008 Notations 5 3 HSMs and APIs 5 3.1 Tamper evidence and Tamper resistance . . . . . . . . . . . . . . . . . . . . . 5 3.2 The role of HSMs and cryptoprocessors . . . . . . . . . . . . . . . . . . . . . 5 3.3 API

BencsĂĄth, BoldizsĂĄr

88

INTEGRATING AUTOMATION DESIGN INFORMATION WITH XML  

E-Print Network (OSTI)

INTEGRATING AUTOMATION DESIGN INFORMATION WITH XML Mika Viinikkala, Seppo Kuikka Institute of Automation and Control, Tampere University of Technology, P.O. Box 692, 33101 Tampere, Finland Email: mika.viinikkala@tut.fi, seppo.kuikka@tut.fi Keywords: Systems integration, XML, automation design Abstract: This paper presents

89

Future Trends in Secure Chip Data Management Nicolas Anciaux, Luc Bouganim and Philippe Pucheral  

E-Print Network (OSTI)

management techniques. 1 Introduction Secure chips, i.e. chips with a high level of tamper resistance concern in this latter case, the strong demand of individual for enforcing their elementary rights to store the data securely (thanks to the chip tamper resistance) and act as a trusted doorkeeper, which

90

Speaking Programs | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

October 28, 2009 Visiting Speaker Program - October 28, 2009 October 28, 2009 Lecture Fraud and Theft in the Information Age by Frank W. Abagnale Jr. Author, Lecturer, Consultant...

91

D  

NLE Websites -- All DOE Office Websites (Extended Search)

documents such as credit cards, driver's license, Social Security Cards, etc. - due to lost or stolen wallet or identity documents. 5. Identity Theft Insurance: Should you...

92

E-Print Network 3.0 - aids policy exceptionalism Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

5272009 Page 4 of 4 Special SituationsExceptions None. Related Policies... Policy 1603 Identity Theft Red Flags Policy Responsible Office Office of the General Counsel......

93

DOE F 1400.20 | Department of Energy  

Office of Environmental Management (EM)

Documents & Publications Personal Property Retirement Work Order, HQ Form 1400.20 An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 COMMENTS&0;...

94

PowerPoint Presentation  

Energy Savers (EERE)

until a records disposition authority has been approved for implementation. Safeguard all records against accidental and intentional damage, loss, theft, destruction, and...

95

DOE/IG-0058  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Theft Case As previously reported, a joint investigation with the FBI, DEA, and the Smith County Sheriff's Department determined that a former security police officer stole...

96

Visiting Speaker Program - October 28, 2009 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fraud and Theft in the Information Age by Frank W. Abagnale Jr. Author, Lecturer, Consultant Mr. Abagnale is one of the world's most respected authorities on forgery,...

97

Contact the Canadian Anti-Fraud Centre (CAFC)  

E-Print Network (OSTI)

Contact the Canadian Anti-Fraud Centre (CAFC) Report the theft to the Canadian Anti- Fraud Center agency in Canada that collects information and criminal intelligence on all forms of mass marketing fraud, including advance fee fraud letters (e.g. West African fraud letters), Internet fraud, identity theft

Boonstra, Rudy

98

Public Safety Ways to Minimize  

E-Print Network (OSTI)

. If a deal seems too good to be true, it probably is. Ensure the websites you are on are secured sites. Never fraud, scams, and identity theft. These crimes can be carried out through e-mail or the Internet.ftc.gov Consumer Response Center (IdentityTheft) 1-877-382-4357 Internet Crime Compliance Center (IC3) http

99

Weekly Security Incident Log Period of Feb 17 -Feb 23, 2014  

E-Print Network (OSTI)

Harassment 2014-000387 ROSS BUILDING - NORTH TOWER Injury Security and EMS responded to a report reported the theft of a leather jacket that was left unattended in Central Square 2/17/2014 05:48 PM Theft alarm. The cause of the alarm was not determined. 2/18/2014 01:13 AM Fire Alarm 2014-000381 PARKING

100

Weekly Security Incident Log Period of Jun 30 -Jul 6, 2014  

E-Print Network (OSTI)

Theft, Under 2014-001117 ROSS BUILDING - NORTH TOWER University Property Security responded to a report left unattended in an insecure residence room. 7/2/2014 12:00 AM Theft, Under 2014-001109 VANIER was determined to be malfunction. 7/2/2014 02:55 AM Fire Alarm 2014-001110 WILLIAM SMALL CENTRE Common A staff

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Rapid Sampling from Sealed Containers - Vulnerability Assessment Team -  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and Nonproliferation and National Security > VAT > Current Projects > Rapid Sampling Tools > ... from Sealed Containers VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Tamper & Intrusion Detection Rapid Sampling from Sealed Containers Demo video Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned

102

2008 Summer Intern Housing Community Standards  

E-Print Network (OSTI)

, values, culture and beliefs and the opportunity to learn from others in the community. We remind you Electronic Media Failure to Comply Gambling Identification Sexual Abuse Vandalism Weapons Safety and Security, Health and Safety Inspections Fire Safety Equipment Intentional False Alarms Residence Rooms

Kaup, David J.

103

Science in the Magazines  

Science Journals Connector (OSTI)

... control of private forest property is vested in the State. In Russia, until lately, liberty to cut, burn, destroy, and devastate forests was unrestricted, but in 1888 a ... a law came in force which, to some extent, put an end to this liberty of vandalism. The Russian Government now sustains twenty-four schools of forestry. A federal ...

1894-04-05T23:59:59.000Z

104

Joseph, P. & Lomas, S. A. (eds) 2004. Deep-Water Sedimentation in the Alpine Basin of SE France.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Nigel Woodcock

105

Brunsden, D. (ed.) 2003. The Official Guide to the Jurassic Coast. Dorset and East Devon’s World Heritage Coast. A Walk through Time.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Simon R. A. Kelly

106

Collie, M. & Diemer, J. (eds) 2004. Murchison’s Wanderings in Russia. His Geological Exploration of Russia in Europe and the Ural Mountains, 1840 and 1841.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Douglas Palmer

107

Koeberl, C. & Martinez-Ruiz, F. (eds) 2003. Impact Markers in the Stratigraphic Record.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Alex Bevan

108

Dilek, Y. & Robinson, P. T. (eds) 2004. Ophiolites in Earth History.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Laurence Coogan

109

Klein, C. 2003. The 22nd Edition of the Manual of Mineral Science.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Allan Pring

110

Ineson, J. R. & Surlyk, F. (eds) 2003. The Jurassic of Denmark and Greenland.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Simon R. A. Kelly

111

Rudwick, M. J. S. 2004. The New Science of Geology. Studies in the Earth Sciences in the Age of Revolution.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Douglas Palmer

112

Williams, D. M. & Forey, P. L. (eds) 2004. Milestones in Systematics.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

David Norman

113

Druitt, T. H. & Kokelaar, B. P. (eds) 2002. The Eruption of Soufrière Hills Volcano, Montserrat, from 1995 to 1999.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Mike Branney

114

Lee, W. H. K., Kanamori, H., Jennings, P. C. & Kisslinger, C. (eds) 2002. International Handbook of Earthquake & Engineering Seismology, Part A.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Frederik Tilmann

115

Arthur, T. J., Macgregor, D. S. & Cameron, N. R. (eds) 2003. Petroleum Geology of Africa: New Themes and Developing Technologies.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

R. C. Selley

116

Guest, J., Cole, P., Duncan, A. & Chester, D. 2003. Volcanoes of Southern Italy.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Ralf Gertisser

117

Andrews, J. E., Brimblecombe, P., Jickells, T. D., Liss, P. S. & Reid, B. J. 2004. An Introduction to Environmental Chemistry, 2nd ed.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Mike Fowler

118

Middleton, G. V. (ed.) 2003. Encyclopedia of Sediments and Sedimentary Rocks.:  

Science Journals Connector (OSTI)

...established'. Great stuff and a real eye opener to the personalities...surrounded by dense housing estates with their attendant vandalism...Valuing the Resource: the Sustainable Ap-proach', was introduced...in Somerset has remained a sustainable resource despite two centuries...

Gary Nichols

119

Creating, destroying, and restoring value in wikipedia  

Science Journals Connector (OSTI)

Wikipedia's brilliance and curse is that any user can edit any of the encyclopedia entries. We introduce the notion of the impact of an edit, measured by the number of times the edited version is viewed. Using several datasets, including recent logs ... Keywords: collaboration, damage, vandalism, wiki, wikipedia

Reid Priedhorsky; Jilin Chen; Shyong (Tony) K. Lam; Katherine Panciera; Loren Terveen; John Riedl

2007-11-01T23:59:59.000Z

120

What Wikipedia deletes: characterizing dangerous collaborative content  

Science Journals Connector (OSTI)

Collaborative environments, such as Wikipedia, often have low barriers-to-entry in order to encourage participation. This accessibility is frequently abused (e.g., vandalism and spam). However, certain inappropriate behaviors are more threatening ... Keywords: Wikipedia, collaboration, content removal, copyright, information security, redaction, user generated content

Andrew G. West; Insup Lee

2011-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Les boursiers du Dpartement l'occasion des concours 2012-2013 des grands organismes subventionnaires (CRSH,  

E-Print Network (OSTI)

: Jaïmé Dubé (doctorat) Laurence Jay-Rayon (doctorat) Aura Navarro (doctorat) Mariana Soledad Raffo Chantale Marchand Aura Navarro (traduction) Mariana Raffo Hugo Vandal-Sirois Automne 2010 Sanaa Benmessaoud (traduction) Aura Navarro (traduction) Janine Pimentel (traduction) Bourses de rédaction ­ Mémoire et thÚse

Parrott, Lael

122

Capturing the Effect of Sulphur in Diesel Exhaust  

Science Journals Connector (OSTI)

A set of actual dynamometer measurements of a heavy-duty diesel vehicle with different lubricant oils and fuels is reproduced using Tampere University of Technology Exhaust Aerosol Model (TUTEAM), and the AEROFOR...

M. Lemmetty; L. Pirjola; E. Vouitsis; J. Keskinen

2007-01-01T23:59:59.000Z

123

User Safety Agreement for Hutch Authorization  

NLE Websites -- All DOE Office Websites (Extended Search)

in the End Station Log Book as Responsible Person whenever I take possession of the Search Reset Key*. 4. I will not tamper with any hutch interlock or component. I will operate...

124

AN EFFICIENT AUTHENTICATION METHOD for H.264/AVC J. Zhang, Student Member, IEEE, A.T.S. Ho, Fellow. lEE  

E-Print Network (OSTI)

Technological University Singapore 639798 Email: Jingzhang@pmail.ntu.edu.sg;etsho@ntu.edu.sg Keywords: Hard detect the tampering by the sensitive mode change. And the experimental results prove the effectiveness

Doran, Simon J.

125

Alternative Fuels Data Center  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Vehicle Conversion It is unlawful to tamper with vehicle emissions control systems unless the action is for the purpose of converting a motor vehicle to operate on an alternative...

126

ECSCW 2003. Proceedings of the Computer Supported Scientific Collaboration Workshop, Eighth European Conference on Computer Supported Cooperative Work, Helsinki, Finland, 14 September 2003  

E-Print Network (OSTI)

90014 Oulu University FINLAND Email: Helena.Karasti@oulu.fiTalja University of Tampere, Finland Abstract. The study of8. -9.9.2003, Espoo, Finland. Tuominen, K. , Talja, S. , &

Karasti, Helena; Baker, Karen; Bowker, Geoffrey C

2003-01-01T23:59:59.000Z

127

A system using implicit feedback and Top Ranking Sentences to help users find relevant web documents  

E-Print Network (OSTI)

White,R.W. Jose,J.M. Ruthven,I.G. 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2002) : Tampere, Finland, 11-15 August 2002 ACM Press

White, R.W.

128

Surreptitious Software: Models from Biology and History  

Science Journals Connector (OSTI)

Over the last decade a bewildering array of techniques have been proposed to protect software from piracy, malicious reverse engineering, and tampering. While we can broadly classify these techniques as obfuscati...

Christian Collberg; Jasvir Nagra; Fei-Yue Wang

2007-01-01T23:59:59.000Z

129

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

130

Extracting secret keys from integrated circuits  

E-Print Network (OSTI)

Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

Lim, Daihyun, 1976-

2004-01-01T23:59:59.000Z

131

The California State Auditor's Office is your confidential avenue for reporting improper activities by state agencies or employees. It is your responsibility, as a government employee, to report any type of fraud,  

E-Print Network (OSTI)

type of fraud, waste, or abuse, which ultimately protects scarce state resources, and to be free from law, including theft, fraud, or conflict of interest; · Noncompliance with an executive order or Rule

California at Santa Cruz, University of

132

Will they buy?  

E-Print Network (OSTI)

The proliferation of inexpensive video recording hardware and enormous storage capacity has enabled the collection of retail customer behavior at an unprecedented scale. The vast majority of this data is used for theft ...

Kubat, Rony Daniel

2012-01-01T23:59:59.000Z

133

Chapter 23 Intentional Destructive Acts  

NLE Websites -- All DOE Office Websites (Extended Search)

salvage market. In the last 10 years, BPA has experienced over 200 thefts or burglaries. BPA estimates that the average monetary damage for each crime is 150,000, but the actual...

134

Fundamentalist Contextualist Compatibilism: A Response to the Consequence Argument  

E-Print Network (OSTI)

occurrences, such as heart attacks and car theft. Because ofthat I’ll have a heart attack sometime in the next sixthat I don’t have a heart attack in the next six months.

Pendergraft, Garrett

2010-01-01T23:59:59.000Z

135

A Static Birthmark of Binary Executables Based on API Call Structure  

Science Journals Connector (OSTI)

A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static birthmark of binary executables based on API

Seokwoo Choi; Heewan Park; Hyun-il Lim…

2007-01-01T23:59:59.000Z

136

DOE F 5500.2 | Department of Energy  

Energy Savers (EERE)

incidents. Operational Incident Report More Documents & Publications DOE F 5639.3 DOE F 471.1 An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010...

137

DOE F 1440.3 | Department of Energy  

Office of Environmental Management (EM)

PROPERTY ON NON-GSA SITE More Documents & Publications Correspondence Style Guide An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 DOE F 4600.1...

138

BOSTON UNIVERSITY Policy BU-100-001  

E-Print Network (OSTI)

to extreme heat or cold or other potentially harmful environmental conditions. Protect the equipment from theft. 2.5.3. For policies regarding remote access to Boston University's information resources, see Remote Access Policy [BU 100-001A]. #12;

Guenther, Frank

139

Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors  

E-Print Network (OSTI)

The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or ...

Schlesinger, Adam Ian

2005-01-01T23:59:59.000Z

140

UNIVERSITY POLICE DEPARTMENT Interoffice Memorandum 11-107  

E-Print Network (OSTI)

1 Assault 1 0 1 18 Burglary 1 0 1 20 Larceny 22 0 22 221 Motor Vehicle Theft 0 0 0 22 Total 24 0 24 POLICING PROJECTS Location / Issue Officer Assigned Date Assigned Date Due Santa Margareta Ecological

Ponce, V. Miguel

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Short-Term Energy Outlook Supplement: Uncertainties in the Short...  

NLE Websites -- All DOE Office Websites (Extended Search)

headed to the Bonny terminal as Shell closed the Nembe Creek Trunkline and Trans Niger Pipeline multiple times to repair leaks attributed to oil theft. There will be lingering...

142

Help:Protecting and unprotecting pages | Open Energy Information  

Open Energy Info (EERE)

Protecting and unprotecting pages Protecting and unprotecting pages Jump to: navigation, search Protecting and unprotecting pages is very straightforward, but these operations require sysop permissions. You can designate a page as a protected page by clicking the 'Protect page' tab, and supplying a comment (a brief textual description of why you are protecting the page). There are several reasons why a particular page might be protected. On public wikis, a protected page is usually one which has been repeatedly targeted with vandalism, or where it is believed that any vandalism would have an unusually severe impact. On corporate wikis, a page may be protected when the content has been frozen via an approval process. However there are also many good reasons for not protecting pages. As a sysop you

143

Help:Protected pages | Open Energy Information  

Open Energy Info (EERE)

Protected pages Protected pages Jump to: navigation, search A protected page is a page where normal users are prevented from editing and/or moving at all. Only a user with sysop permissions can edit or move a protected page. Likewise only sysop users can protect a page in the first place, or unprotect the page to lift the restriction. There are several reasons why a particular page might be protected: On public wikis, pages may be protected because they have been repeatedly targeted with vandalism or moved to bad titles, or where it is believed that vandalism or page moves would have a unusually severe impact. On corporate wikis, pages may be protected when they contain statements which have been approved by management, and policy dictates that those statements can't be changed without following a certain approval

144

Microsoft PowerPoint - IPRC 2012 Cold Finger Separation [9]  

NLE Websites -- All DOE Office Websites (Extended Search)

Fission Fission Product Separation by Cold Finger Crystal Growth Fission Product Separation by Cold Finger Crystal Growth Joshua R. Versey* and Supathorn Phongikaroon University of Idaho, Idaho Falls Center for Advanced Energy Studies *vers4197@vandals.uidaho.edu Michael F. Simpson Idaho National Laboratory Joshua R. Versey* and Supathorn Phongikaroon University of Idaho, Idaho Falls Center for Advanced Energy Studies *vers4197@vandals.uidaho.edu Michael F. Simpson Idaho National Laboratory 2012 IPRC Fontana, Wisconsin 2012 IPRC Fontana, Wisconsin Outline * Background * Motivation & Goals * Cold Finger Theory * Cold Finger Design * Experimental Program * Results & Discussion * Summary & Future Work 2 Background Advanced Pyrochemical Technology Concept 3 Background 4 Advanced Pyrochemical Technology Concept Background 5 Oxide Reduction Process Cathode

145

Tags and seals to strengthen arms control verification  

SciTech Connect

Tags and seals have long been recognized as important tools in arms control. The trend in control of armaments is to limit militarily significant equipment that is capable of being verified through direct and cooperative means, chiefly on-site inspection or monitoring. Although this paper will focus on the CFE treaty, the role of tags and seals for other treaties will also be addressed. Published technology and concepts will be reviewed, based on open sources. Arms control verification tags are defined as unique identifiers designed to be tamper-revealing; in that respect, seals are similar, being used as indicators of unauthorized access. Tamper-revealing tags are intended as single-point markers, seals for two-point couplings, and nets for volume containment. Seals usually bind two separate components, such as a hatch or flange that provides access to a secure compartment or a valve that controls fluid flow. A tamper-revealing net might be comprised of a coupled fiberoptic bundle wrapped around an object. Sometimes the term ``seal`` is used to denote the tamper-revealing feature of a tag that is attached to a surface, but in this paper the tamper-indicating connection is considered to be part of the tag concept itself.

DeVolpi, A.

1990-10-03T23:59:59.000Z

146

Overview of conservation treatments applied to rock glyph archaeological sites  

E-Print Network (OSTI)

generally accepted suggestion. There were several other suggestions offered that were equally inappropriate. These included scrubbing the surface with wire brushes, applying commercial paint remover products marketed specifically for vandalism, using... world interest turned again to the protection of archaeological sites as evidenced by the 1964 ICOMOS Venice Charter for the Conservation and Restoration of Monuments and Sites. The Venice Charter established goals of preservation and conservation...

Dandridge, Debra E

2012-06-07T23:59:59.000Z

147

New Seals - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

More Information More Information VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

148

Insanely Fast Microprocessor Shop - Vulnerability Assessment Team - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Insanely Fast Microprocessor Shop Insanely Fast Microprocessor Shop VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

149

Useful Resources- Vulnerability Assessment Team - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Selected Publications Selected Publications VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

150

About Seals - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Seals Seals VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

151

Vulnerability Assessment Team (VAT) - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Vulnerability Assessment Team Vulnerability Assessment Team VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

152

Findings and Lessons, Seals - Vulnerability Assessment Team - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Findings and Lessons Learned Findings and Lessons Learned VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

153

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

154

Definitions, Seals - Vulnerability Assessment Team - Nuclear Engineering  

NLE Websites -- All DOE Office Websites (Extended Search)

Definitions Definitions VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

155

Safety - Vulnerability Assessment Team - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety Safety VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

156

EPA Mobile Source Enforcement Memo 1A  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

UNITED STATES ENVIRONMENTAL PROTECTION AGENCY UNITED STATES ENVIRONMENTAL PROTECTION AGENCY WASHINGTON, D.C. 20460 OFFICE OF ENFORCEMENT AND COMPLIANCE ASSURANCE September 4, 1997 Addendum to Mobile Source Enforcement Memorandum 1A SUBJECT: Tampering Enforcement Policy for Alternative Fuel Aftermarket Conversions A. Purpose The purpose of this document is to clarify and revise the U.S. Environmental Protection Agency's (EPA's) "tampering" enforcement policy for motor vehicles and motor vehicle engines originally designed to operate on gasoline or diesel fuel and subsequently modified to operate exclusively or in conjunction with compressed natural gas (CNG) or liquified petroleum gas (LPG or propane), hereinafter referred to as "alternative fuels". The provisions of

157

Investigation Letter Report: I11IG002 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Letter Report: I11IG002 Letter Report: I11IG002 Investigation Letter Report: I11IG002 August 17, 2011 Impact of Copper Thefts on the Department of Energy A series of news articles during the last several months have reported increased thefts of copper nationally, including several that have interrupted electrical distribution and telephone service in communities across the country. The Department of Energy's laboratories, environmental remediation sites, generating stations and other facilities have not been immune to this problem. Over the last few years, the Office of Inspector General (OIG) has successfully investigated numerous reports of copper thefts from Department sites nationwide. The OIG believes that there are several practical, cost-effective steps that the Department can

158

NON-NEGATIVE MATRIX FACTORIZATION FOR HIGHLY NOISE-ROBUST ASR: TO ENHANCE OR TO RECOGNIZE?  

E-Print Network (OSTI)

šat Mšunchen, Germany 2 Department ESAT, Katholieke Universiteit Leuven, Belgium 3 Department of Signal Processing, Tampere University of Technology, Finland weninger@tum.de ABSTRACT This paper proposes a multi. On the one hand, a clean speech sig- nal can be estimated from the product of speech dictionaries

Virtanen, Tuomas

159

Transmission Line Security Monitor  

SciTech Connect

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

160

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network (OSTI)

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

162

Banking Security: Attacks and Defences Steven J. Murdoch  

E-Print Network (OSTI)

is still a serious problem in the UK Initially (2005), PEDs were tampered on a small scale and installed;Counterfeit fraud mainly exploited backwards compatibility features · Upgrading to Chip & PIN was too complex a full copy of the magstrip · Simplifies issuer upgrade · Chip transactions can be processed by systems

Doran, Simon J.

163

Efficient Video Authentication for H.264/AVC School of Electrical and Electronic Engineer  

E-Print Network (OSTI)

Engineer Nanyang Technology University 639798 Singapore jingzjang@pmail.ntu.edu.sg Anthony T. S. Ho School the tampering by the sensitive mode change. And the experimental results prove the effectiveness the algorithm the effectiveness the algorithm. The rest of this paper is organized as follows. Sec- tion 2 provides the reader

Doran, Simon J.

164

Optimal Neighborhood Preserving Visualization by Maximum Satisfiability Kerstin Bunte  

E-Print Network (OSTI)

University Finland Matti Jšarvisalo HIIT, University of Helsinki Finland Jeremias Berg HIIT, University of Helsinki Finland Petri Myllymšaki HIIT, University of Helsinki Finland Jaakko Peltonen University of Tampere, Finland HIIT, Aalto University, Finland Samuel Kaski HIIT, Aalto University, University

Kaski, Samuel

165

2009 No part may be reproduced in any form without prior authorization.  

E-Print Network (OSTI)

/Tamper Detection 3. Comm. Protocol Security 4. Risk Mgmt. Enhancement 5. High Speed Encryption 1. Self Healing Grid authorization. Selfhealing "Smart" Grid (1998present) Building on the Foundation: · Anticipation of disruptive/or led at EPRI Enterprise Information Security (EIS) Infrastructure Security Initiative (ISI) Consortium

Amin, S. Massoud

166

Project 93L-EWL-097, fire alarm system improvements, 300 Area  

SciTech Connect

This document contains the Acceptance Test Procedure (ATP) which will demonstrate that the modifications to the Fire Protection systems in the 338 Building function as intended. The ATP will test the fire alarm control panel, flow alarm pressure switch, post indicator valve tamper switch, heat detectors, flow switches, and fire alarm signaling devices.

Scott, M.V.

1995-01-01T23:59:59.000Z

167

Three-dimensional Josephson-junction arrays: Static magnetic response R. De Luca and T. Di Matteo  

E-Print Network (OSTI)

Three-dimensional Josephson-junction arrays: Static magnetic response R. De Luca and T. Di Matteo Tampere, Finland Received 17 July 1997 In this work we present a simple three-dimensional Josephson-junction directions perpendicular to one cube side. S0163-1829 98 05502-7 I. INTRODUCTION The interest in Josephson-junction

Di Matteo, Tiziana

168

Dealing with Local Files Using the File API  

Science Journals Connector (OSTI)

It’s a well-known fact that for the sake of security and privacy, browsers don’t allow web applications to tamper with the local file system. Local files are used in a web application only when the user decide...

Bipin Joshi

2012-01-01T23:59:59.000Z

169

HIGHER EDUCATION OPPORTUNITY ACT REPORTING University of Delaware  

E-Print Network (OSTI)

conducted by University Police and evaluated by the University Fire Protection Engineer each semester. #12 outages of heat). E. Use of extension cords. F. Tampering with or blocking any fire protection equipment://www.facilities.udel.edu/resfacilitiesmaintenance.aspx E. Fire safety education and training programs for students, faculty and staff: The Fire Protection

Firestone, Jeremy

170

Integration of automation design information using XML technologies  

E-Print Network (OSTI)

Integration of automation design information using XML technologies Master of Science Thesis Mika UNIVERSITY OF TECHNOLOGY DEPARTMENT OF AUTOMATION #12;2 Abstract TAMPERE UNIVERSITY OF TECHNOLOGY Automation Degree Program Institute of Automation and Control Viinikkala, Mika: Integration of automation design

171

Weekly Security Incident Log Period of Jun 24 -Jun 30, 2013  

E-Print Network (OSTI)

his drinking water bottle had been tampered with while it was left unattended. Toronto Police were. The vehicle driver left the scene without reporting the incident. 6/26/2013 10:13 AM Motor Vehicle Incident rear quarter panel. No injuries were reported. 6/26/2013 07:07 PM Motor Vehicle Incident 2013

172

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

173

Voice Conversion Jani Nurminen1, Hanna Siln2, Victor Popa2,  

E-Print Network (OSTI)

of voice conversion, it is essential to understand the factors that determine the perceived speaker0 Voice Conversion Jani Nurminen1, Hanna Silén2, Victor Popa2, Elina Helander2 and Moncef Gabbouj2 1Accenture 2Tampere University of Technology Finland 1. Introduction Voice conversion (VC

Gabbouj, Moncef

174

Critical Dimensions of Water-tamped Slabs and Spheres of Active Material  

DOE R&D Accomplishments (OSTI)

The magnitude and distribution of the fission rate per unit area produced by three energy groups of moderated neutrons reflected from a water tamper into one side of an infinite slab of active material is calculated approximately in section II. This rate is directly proportional to the current density of fast neutrons from the active material incident on the water tamper. The critical slab thickness is obtained in section III by solving an inhomogeneous transport integral equation for the fast-neutron current density into the tamper. Extensive use is made of the formulae derived in "The Mathematical Development of the End-Point Method" by Frankel and Goldberg. In section IV slight alterations in the theory outlined in sections II and III were made so that one could approximately compute the critical radius of a water-tamper sphere of active material. The derived formulae were applied to calculate the critical dimensions of water-tamped slabs and spheres of solid UF{sub 6} leaving various (25) isotope enrichment fractions. Decl. Dec. 16, 1955.

Greuling, E.; Argo, H.: Chew, G.; Frankel, M. E.; Konopinski, E.J.; Marvin, C.; Teller, E.

1946-08-06T23:59:59.000Z

175

Thermocommunication Julien Brouchier1  

E-Print Network (OSTI)

to be replaced. You turn electricity off, move a table to the center of the room, put a chair on top of the table struc- tures. These physical quantities must be stored, sensed and combined by the elementary devices (gates) of any technology out of which we build tamper-resistant machinery. At any given point

176

Modelling Traceability in the Forestry Wood Supply Chain  

E-Print Network (OSTI)

Modelling Traceability in the Forestry Wood Supply Chain Antti Sirkka University of Tampere Tieto.sirkka@uta.fi antti.sirkka@tietoenator.com Abstract--Equivalent of 5 billion of wood raw material is going to waste wood production system. The RFID-technology can achieve automatic traceability by enabling us

177

The effects of vibration loading on adipose stem cell number, viability and differentiation towards bone-forming cells  

Science Journals Connector (OSTI)

...used in clinical bone tissue engineering [33,34]. Vibration stimuli...of ASC-based bone tissue engineering constructs. As recent findings...and built at the Biomedical Engineering Department, Tampere University...amplified by a T.AMP E800 audio amplifier (Musikhaus Thomann...

2011-01-01T23:59:59.000Z

178

portfolioJan2006_final_v2.pdf  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Characterize Characterize problem and prioritize program actions to reduce the threat to U.S. national security from radiological materials being used in "dirty bombs." Approach Argonne is working with the DOE National Nuclear Safety Administration, NA-25, to compile information from diverse sources into a comprehensive database, analyze and model information, and communicate results. Benefits Increased understanding of radionuclide sources and their locations, theft and diversion activities, and the ability to direct resources in the International Radiological Threat Reduction program where they will be most effective. POC: Roy Lindley, lindley@anl.gov Argonne National Laboratory Analysis of Radionuclide Theft and Diversions Geospatial Science Program

179

SSRL HEADLINES July 2009  

NLE Websites -- All DOE Office Websites (Extended Search)

July, 2009 July, 2009 __________________________________________________________________________ Contents of this Issue: SSRL Initiates 200-mA Beam Line Operations Science Highlight - Molecular Mixing in Organic Solar Cells Science Highlight - Understanding Nature's Assembly of Molecules to Improve Tomorrow's Electronics New BL5 Branch Line Funded by DOE X-ray/VUV Beam Time Requests Due August 1 Register to Participate in the SSRL/LCLS Users' Conference - October 18-21, 2009 Submit Nominations for Spicer, Klein and Lytle Awards Call for User Science Posters and Outstanding Student Poster Competition SSRL Structural Molecular Biology Summer School - September 8-11, 2009 Vandalism at SSRL Provide Feedback Using User Portal __________________________________________________________________________

180

A review of "Drama and the Performing Arts in Pre-Cromwellian Ireland: A Repertory of Sources and Documents from the Earliest Times Until c. 1642." by Alan J. Fletcher  

E-Print Network (OSTI)

among the Irish State Papers in the Public Record Office in London describing the vandalism of a statue by Sir Brian O?Rourke and his men. According to one document: . . . O reworcke found an Image of a [tall] tall woman and wroate vpon the brest...). The other documents in Sir Brian O?Rourke?s ?trayterous pagent? (6.3) support the above statement. Not all performing artists were designated as such, neither O?Rourke nor his men were entertainers in the true sense, though they could easily be classified...

Kay J. Blalock

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Supplementary Table1. TE-derived miRNAs. ath-MIR414 MI0001425 chr1:25141119-25141226(-) ATCopia24I  

E-Print Network (OSTI)

Supplementary Table1. TE-derived miRNAs. Namea Accnb Coordsc TEd Overlape ath-MIR414 MI0001425 chr1:25141119-25141226(-) ATCopia24I (LTR/Copia) 57.41 ath-MIR855 MI0005411 chr2:4681509-4681780(+) Athila4B_LTR (LTR/Gypsy) 100.00 ath-MIR416 MI0001427 chr2:7015602-7015681(+) Vandal1 (DNA/MuDR) 100.00 ath-MIR405a MI0001074 chr2

Jordan, King

182

Evaluation of Canal Lining Projects in the Lower Rio Grande Valley  

E-Print Network (OSTI)

?unintentional?vandalism,?and?normal?irrigation?district?operational?and?maintenance? activities.??Each?project?was?evaluated?using?a?visual?inspection?process?during?which? performance/condition?ratings?were?assigned.? ? Without?question,?the?best?lining?system?is?a?synthetic?liner?with?a?protective?barrier?of? shotcrete.??The?synthetic?liner?significantly?reduces?seepage,?while?the?shotcrete?protects...?it? from?damage.??This?lining?system?needs?little?to?no?maintenance.??There?were?two?types?of? liners?used:?PVC?and?polyester.??Each?performed?equally?as?well.? ? The?performance?of?synthetic?liners?without?a?protective...

Karimov, Askar; Leigh, Eric; Fipps, Guy

183

Impact of orifice metering uncertainties  

SciTech Connect

In a recent utility study, attributed 38% of its unaccounted-for UAF gas to orifice metering uncertainty biasing caused by straightening vanes. How this was determined and how this applied to the company's orifice meters is described. Almost all (97%) of the company's UAF gas was found to be attributed to identifiable accounting procedures, measurement problems, theft and leakage.

Stuart, J.W. (Pacific Gas and Electric Co., San Francisco, CA (USA))

1990-12-01T23:59:59.000Z

184

Loss PreventionIBM Retail Store Solutions Executive Brief  

E-Print Network (OSTI)

Loss PreventionIBM Retail Store Solutions Executive Brief Getting smarter about retail loss prevention. Wayne Truhan, business development executive, IBM Retail Store Solutions #12;2 Getting smarter about retail loss prevention. "With the downturn in the economy, we have seen an increase in theft

185

IP Easy-pass: A Light-weight Network-edge Resource Access Haining Wang Abhijit Bose Mohamed El-Gendy Kang G. Shin  

E-Print Network (OSTI)

-based Internet ac- cess often requires that sufficient network resources be re- served for real-time traffic. However, the reserved network resource is susceptible to resource theft and abuse. Without a resource pack- ets, the traffic conditioning and policing enforced at ISP (Internet Service Provider) edge

Wang, Haining

186

Issues in Cryptography Ronald L. Rivest  

E-Print Network (OSTI)

SKA may be vulnerable to abuse or theft... #12;Can SKA go on a smart card? SKA Alice? Internet Alice" #12;Cryptography in Theory Alice SKA Internet #12;But Alice is not a computer! Alice needs a computer authorized... #12;Cryptography in Practice SKA Alice! Internet Alice? #12;But her OS is not secure! Modern OS

Rivest, Ronald L.

187

... Staff ... Students Recognizingdanger  

E-Print Network (OSTI)

and passwords. Password theft and phishing When sending confidential information over the Internet intervals Guidelines to avoid password abuse Examples john MfTsm1feoaD sicherunsicher You should avoid using computer connected to the Internet. Malware (i.e. Viruses & spyware), can infiltrate your computer without

Ott, Albrecht

188

Online Money Management Tools for Students Borrow strategically  

E-Print Network (OSTI)

Online Money Management Tools for Students Borrow strategically Direct Loan program: studentloans.com/CreditEducation/WhatsInYourScore.aspx What you need to know about your credit: ftc.gov/gettingcredit Manage your personal finances Money management: onestop.umn.edu/finances/manage_money Planning your financial life: mymoney.gov Identity Theft

Weinberger, Hans

189

2009 Daily Log Report #: 2009-00202  

E-Print Network (OSTI)

2009 Daily Log March 2009 Report #: 2009-00202 Reported: 03/31/09 2045 Occurred: 03/29/09 1400 to 03/30/09 2000 Incident: Theft Location: Lot Q Disposition: Report--Open Comments: GPS System stolen from unlocked vehicle. Report #: 2009-00201 Reported: 03/31/09 1833 Occurred: Same Incident: Fire

Boyce, Richard L.

190

Report #: 2008-00572 Reported: 07/31/08 2200  

E-Print Network (OSTI)

July 2008 Report #: 2008-00572 Reported: 07/31/08 2200 Occurred: Same Incident: Disorderly Conduct and trying to incite a crowd. Report #: 2008-00571 Reported: 07/31/08 1012 Occurred: 07/30/08 1230 to 07/31/08 1000 Incident: Burglary Location: Landrum Disposition: Report--Open Comments: Theft of property from

Boyce, Richard L.

191

JANUARY 2008 Report #: 2008-00070  

E-Print Network (OSTI)

JANUARY 2008 Report #: 2008-00070 Reported: 01/31/08 1914 Occurred: 01/31/08 1300 to 1900 Incident: Theft Location: Parking Lot M Disposition: Report--Inactive Comments: Student reported his NKU Student Parking Permit was taken from his unlocked vehicle. Report #: 2008-00069 Reported: 01/30/08 1410 Occurred

Boyce, Richard L.

192

August 2008 Report #: 2008-00632  

E-Print Network (OSTI)

August 2008 Report #: 2008-00632 Reported: 08/30/08 1757 Occurred: Same Incident: Fire/Smoke Alarm Location: Dorms--Callahan Hall Disposition: Report--Closed Comments: Fire alarm activation due to burnt popcorn. Report #: 2008-00631 Reported: 08/30/08 0900 Occurred: 08/28/08 1050 to 1205 Incident: Theft

Boyce, Richard L.

193

2010 Daily Log Report #: 2010-00262  

E-Print Network (OSTI)

2010 Daily Log June 2010 Report #: 2010-00262 Reported: 06/30/10 0957 Occurred: 06/24/10 1630 to 0957 Incident: Theft Location: Founders Hall Disposition: Report--Open Comments: Several textbooks stolen from office. No Reportable Activity on 06/29/10 Report #: 2010-00261 Reported: 06/28/10 1720

Boyce, Richard L.

194

FEBRUARY 2008 Report #: 2008-00182  

E-Print Network (OSTI)

FEBRUARY 2008 Report #: 2008-00182 Reported: 02/29/08 1814 Occurred: Same Incident: Theft Location: Dorms ­ Woodcrest Apartment (Oak) Disposition: Report--Inactive Comments: Student reported personal belongings came up missing from her room. Report #: 2008-00181 Reported: 02/29/08 1702 Occurred: Same

Boyce, Richard L.

195

Protect yourself from FRAUD When you apply for health coverage through Maryland Health Connection, you can protect  

E-Print Network (OSTI)

Protect yourself from FRAUD When you apply for health coverage through Maryland Health Connection, you can protect yourself from fraud by taking the following actions: If you suspect identity theft Commission at ftccomplaintassistant.gov. If you suspect insurance fraud, call the Maryland Insurance

Hill, Wendell T.

196

ft.... "'~l '1~--"", ~:.~..;.,MIT's  

E-Print Network (OSTI)

' group before and they were happy in their individual dorms," said Ann Orlando, Harvard Square, said hack a hack attempt gone awry. Class of 2004 Ring Committee member Amal Dorai '04.and several r In the shooting. Hack Attempt Thwarted By Theft Of Paw From MIT Beaver Costume Cambridge, Massachusetts 02139

197

Abstract--Efficient methods for detecting electricity fraud has been an active research area in recent years. This paper presents  

E-Print Network (OSTI)

1 Abstract--Efficient methods for detecting electricity fraud has been an active research area for electric utilities using Genetic Algorithm (GA) and Support Vector Machine (SVM). The main motivation, genetic algorithm, electricity theft, non-technical loss, load profile. I. INTRODUCTION LECTRIC utilities

Ducatelle, Frederick

198

SmartD: smart meter data analytics dashboard  

Science Journals Connector (OSTI)

The ability of smart meters to communicate energy consumption data in (near) real-time enables data analytics for novel applications, such as pervasive demand response, personalized energy feedback, outage management, and theft detection. Smart meter ... Keywords: energy consumption analysis, smart meters, visualization

Aylin Jarrah Nezhad, Tri Kurniawan Wijaya, Matteo Vasirani, Karl Aberer

2014-06-01T23:59:59.000Z

199

Understanding Users' Requirements for Data Protection in Smartphones Ildar Muslukhov #1  

E-Print Network (OSTI)

@ece.ubc.ca 5 beznosov@ece.ubc.ca Nokia Research Center Palo Alto, USA 3 cynthia.kuo@nokia.com 4 jonathan than browsing the Web [3]. Recent report shows that 96% of the U.S. population have a mobile phone, 35 or damaged. Recent report shows that 52% of Miami city's population have experienced cell phone loss or theft

200

Eurocontrol Workshop Dec , 2008  

E-Print Network (OSTI)

Chilled products ­ Piles of cartons Fresh fruits 1. Carton alignment for unrestricted air flow 2 practices · Dangerous products · Pharmaceutical products · Air cargo theft Manifest · Detailed loading plan Including Air Traffic Abder AGGOUN abder.aggoun@klsoptim.com #12;Eurocontrol Workshop ­ Dec , 2008 Packing

Flener, Pierre

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

AMERICAN UNIVERSITY OF BEIRUT UNIVERSITY RADIATION SAFETY COMMITTEE  

E-Print Network (OSTI)

): _____________________________________________________ 9. RADIOACTIVE WASTE What method(s) will be used to dispose of your radioactive wastes? Separation): _____________________________________________________ How will you secure radioactive waste to prevent loss or theft? Waste container will be conspicuously will be the principal authorized user for communications, ordering radioactive materials, etc. The Training

Shihadeh, Alan

202

7E N G I N E E R I N G & S C I E N C E N O . 1 / 22 0 0 5 TMI, Meet IST  

E-Print Network (OSTI)

be because the keyless entry system is getting cross talk from a defective accelerometer in the air bags. Today's cars have so many computer chips, says Jehoshua "Shuki" Bruck, the Moore Professor copies of, say, Grand Theft Auto. Says Bruck, "The car industry is investing billions of dollars

Bruck, Jehoshua (Shuki)

203

Password management strategies for online accounts  

Science Journals Connector (OSTI)

Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability; ... Keywords: password, password management, password reuse, security, survey, user behavior

Shirley Gaw; Edward W. Felten

2006-07-01T23:59:59.000Z

204

Predicting Social Security numbers from public data  

Science Journals Connector (OSTI)

...A strategic plan . www.idtheft...consider enacting standards for truncating...received for review January 18...Generation of Data Mining NSF Symposium...Can, F. Chat mining for gender...theft literature review. Research...A strategic plan, (2007...implications of data mining. In Proceedings...

Alessandro Acquisti; Ralph Gross

2009-01-01T23:59:59.000Z

205

Student Business Services Student Services Bldg.  

E-Print Network (OSTI)

Student Business Services 203 Hahn Student Services Bldg. sbs.ucsc.edu Sheryl Hoffman #12;Information Student Billing Refunds: Financial Aid, Loans and scholarships Direct Deposit Checks Deferred As an outgrowth of the University's commitment to the student's privacy and protection against identity theft

California at Santa Cruz, University of

206

We've found an error in our paper. In the threshold signature scheme that we used, there are restrictions on the threshold value. In particular if the key is shared over a degree t polynomial, then 2t+1 players (not t+1)  

E-Print Network (OSTI)

and will be updating the paper accordingly. Securing Bitcoin wallets via threshold signatures Steven Goldfeder stevenag@cs.princeton.edu Arvind Narayanan arvindn@cs.princeton.edu ABSTRACT The Bitcoin ecosystem has suffered frequent thefts serious. Due to the irre- versibility, automation, and pseudonymity of transactions, Bitcoin currently

Singh, Jaswinder Pal

207

Your University of Bristol Tier 4 Student Visa, March 2014, v5 Document Owner: International Advice and Support  

E-Print Network (OSTI)

Your University of Bristol Tier 4 Student Visa, March 2014, v5 Document Owner: International Advice a copy of these documents makes securing a replacement much easier. You should inform the police as soon as you are aware of a loss or theft of these documents, as you will also need a crime reference number

Bristol, University of

208

Salvaging Timber: What should I do with my damaged timber?  

E-Print Network (OSTI)

. Casualty losses can be claimed on IRS Form 4684, which is available in IRS Publi- cation 2194, the Disaster Losses Kit. To file IRS Form 4684, Casualties and Theft, and claim a loss, a landowner needs three values: ? fair market value before...

Taylor, Eric; Foster, C. Darwin

2005-10-31T23:59:59.000Z

209

Weekly Security Incident Log Period of Aug 25 -Aug 31, 2014  

E-Print Network (OSTI)

2014-001396 ROSS BUILDING - NORTH TOWER University Property Complainant reported that several office on the pedestrian walkway outside the north entrance of the Lassonde building. 8/25/2014 03:06 AM Suspicious Vehicle location. 8/25/2014 09:31 PM Theft, Under 2014-001402 ROSS BUILDING - SOUTH TOWER By Mail Security

210

Weekly Security Incident Log Period of Jun 2 -Jun 8, 2014  

E-Print Network (OSTI)

. A description of a suspect was obtained. 6/4/2014 06:39 PM Theft, Under 2014-000979 ROSS BUILDING - NORTH TOWERWeekly Security Incident Log Period of Jun 2 - Jun 8, 2014 Incident No. Reported Date Building Name lot. No injuries were reported. 6/2/2014 06:19 PM Motor Vehicle Incident 2014-000960 TECHNOLOGY

211

Weekly Security Incident Log Period of Nov 27 -Dec 2, 2012  

E-Print Network (OSTI)

was obtained. 11/28/2012 01:41 PM Suspicious Person 2012-002119 ROSS BUILDING - NORTH TOWER Private PropertyWeekly Security Incident Log Period of Nov 27 - Dec 2, 2012 Incident No. Reported Date Building:41 AM Theft, Under Weekly Security Incident Log Printed: 12/3/2012 3:18:11 PM 1 Period of Nov 27 - Dec 2

212

Weekly Security Incident Log Period of Jan 28 -Feb 3, 2013  

E-Print Network (OSTI)

Medical 2013-000194 PARKING LOT 1 - YORK BLVD NORTH OUTER RESERVED Subject not Identified Complainant reported being followed by an unknown male from the Ross Building to the parking lot. The male approached Room. 1/29/2013 08:00 PM Theft, Under 2013-000201 ROSS BUILDING - SOUTH TOWER Non-Community Member

213

BOSTON UNIVERSITY Policy BU 100-000  

E-Print Network (OSTI)

Security Plan and controls will not prohibit building access to authorized disaster recovery personnel personnel should be logged whenever feasible. 2.2. Facility Security Plan [164.310(a)(2)(ii)] ­ CEs must, or theft. Each CE must develop a Facility Security Plan specific to its local environment. 2

Guenther, Frank

214

InsightSan Francisco Chronicle and SFGate.com | Sunday, February 26, 2012 | Section E +BooksPullout section  

E-Print Network (OSTI)

's tough- est challenges, including climate change, identity theft and patent pro- tection. Some and government leaders outside of traditional legal practice? From finance to health care to glob- al poverty of leader- ship in legal education. What sets us apart from other great law schools is our core mission

Doudna, Jennifer A.

215

TABLE OF CONTENTS Risk Analysis Methods Adapted to Computer Security (Revised Paper)  

E-Print Network (OSTI)

Security e Espionage e Terrorism e Nuclear Theft Environmental Risk Computer Reliability Health & Safety#12;TABLE OF CONTENTS Title Page Risk Analysis Methods Adapted to Computer Security (Revised Security Lattice Management c. T. Fe~guson & c. B. Murphy . . . · · . . . 15 Gould Computer Systems

216

How to Properly Secure Your Bicycle Make sure the U-lock passes through the center of the frame as well as both wheels!  

E-Print Network (OSTI)

How to Properly Secure Your Bicycle Make sure the U-lock passes through the center of the frame as well as both wheels! Improperly Securing & Locking Your Bicycle Makes It an Easy Target for Thieves and seats Most thefts of bicycles occur because the lock being used is either a cable lock

Blanchette, Robert A.

217

BICYCLE WARNING Bicycles must be parked in bicycle racks  

E-Print Network (OSTI)

BICYCLE WARNING Bicycles must be parked in bicycle racks They are not to be locked to or leaned responsibilities of University employees. Bicycles found in violation are subject to ticketing and/or impoundment YOUR BICYCLE Fill the bike lock as much as possible This helps to prevent theft as tools are difficult

Thompson, Michael

218

Table 1. A survey of bicycle experience from 208 National Taiwan University students who use or have used a bicycle  

E-Print Network (OSTI)

Table 1. A survey of bicycle experience from 208 National Taiwan University students who use or have used a bicycle Questions Avg. Answer What is the total period that you ride a bike in campus? 2 and Participatory Sensing ABSTRACT Bicycle theft has been a well-known issue for many years. This study presents

Ouhyoung, Ming

219

LLNL Contribution to Sandia Used Fuel Disposition - Security March 2011 Deliverable  

SciTech Connect

Cleary [2007] divides the proliferation pathway into stages: diversion, facility misuse, transportation, transformation, and weapons fabrication. King [2010], using Cleary's methodology, compares a deepburn fusion-driven blanket containing weapons-grade plutonium with a PWR burning MOX fuel enrichments of 5-9%. King considers the stages of theft, transportation, transformation, and nuclear explosive fabrication. In the current study of used fuel storage security, a similar approach is appropriate. First, one must consider the adversary's objective, which can be categorized as on-site radionuclide dispersion, theft of material for later radionuclide dispersion, and theft of material for later processing and fabrication into a nuclear explosive. For on-site radionuclide dispersion, only a single proliferation pathway stage is appropriate: dispersion. That situation will be addressed in future reports. For later radionuclide dispersion, the stages are theft, transportation, and transformation (from oxide spent fuel containing both fission products and actinides to a material size and shape suitable for dispersion). For later processing and fabrication into a nuclear explosive, the stages are theft (by an outsider or by facility misuse by an insider), transportation, transformation (from oxide spent fuel containing both fission products and actinides to a metal alloy), and fabrication (of the alloy into a weapon). It should be noted that the theft and transportation stages are similar, and possibly identical, for later radionuclide dispersion and later processing and fabrication into a nuclear explosive. Each stage can be evaluated separately, and the methodology can vary for each stage. For example, King starts with the methodology of Cleary for the theft, transportation, transformation, and fabrication stages. Then, for each stage, King assembles and modifies the attributes and inputs suggested by Cleary. In the theft (also known as diversion) stage, Cleary has five high-level categories (material handling during diversion, difficulty of evading detection by the accounting system, difficulty of evading detection by the material control system, difficulty of conducting undeclared facility modifications for the purpose of diverting nuclear material, and difficulty of evading detection of the facility modifications for the purposes of diverting nuclear material). Each category has one or more subcategories. For example, the first category includes mass per significant quantity (SQ) of nuclear material, volume/SQ of nuclear material, number of items/SQ, material form (solid, liquid, powder, gas), radiation level in terms of dose, chemical reactivity, heat load, and process temperature. King adds the following two subcategories to that list: SQs available for theft, and interruptions/changes (normal and unexpected) in material stocks and flows. For the situation of an orphaned surface storage facility, this approach is applicable, with some of the categories and subcategories being modified to reflect the static situation (no additions or removals of fuel or containers). In addition, theft would require opening a large overpack and either removing a full container or opening that sealed container and then removing one or more spent nuclear fuel assemblies. These activities would require time without observation (detection), heavy-duty equipment, and some degree of protection of the thieves from radiological dose. In the transportation stage, Cleary has two high-level categories (difficulty of handling material during transportation, and difficulty of evading detection during transport). Each category has a number of subcategories. For the situation of an orphaned surface storage facility, these categories are applicable. The transformation stage of Cleary has three high-level categories (facilities and equipment needed to process diverted materials; knowledge, skills, and workforce needed to process diverted materials; and difficulty of evading detection of transformation activities). Again, there are subcategories. King [2007

Blink, J A

2011-03-23T23:59:59.000Z

220

The Journal of Physical Security - Vulnerability Assessment Team - Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Projects > The Journal of Physical Current Projects > The Journal of Physical Security VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast ”Processor Shop Insanely Fast ”Processor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Cape Coral Youth Center Helps Light the Way to Energy Savings | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cape Coral Youth Center Helps Light the Way to Energy Savings Cape Coral Youth Center Helps Light the Way to Energy Savings Cape Coral Youth Center Helps Light the Way to Energy Savings May 18, 2011 - 4:32pm Addthis Cape Coral Youth Center Manager Mark Cagel stands in front of a tamper-proof thermostat at the Austen Youth Center in Cape Coral, Florida. | Photo Courtesy of the Cape Coral Youth Center Cape Coral Youth Center Manager Mark Cagel stands in front of a tamper-proof thermostat at the Austen Youth Center in Cape Coral, Florida. | Photo Courtesy of the Cape Coral Youth Center April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs What does this project do? Reduce the city's energy use by 40 percent over the next 15 years. Engineers able to research more efficient lighting techniques.

222

Apparatus for safeguarding a radiological source  

DOE Patents (OSTI)

A tamper detector is provided for safeguarding a radiological source that is moved into and out of a storage location through an access porthole for storage and use. The radiological source is presumed to have an associated shipping container approved by the U.S. Nuclear Regulatory Commission for transporting the radiological source. The tamper detector typically includes a network of sealed tubing that spans at least a portion of the access porthole. There is an opening in the network of sealed tubing that is large enough for passage therethrough of the radiological source and small enough to prevent passage therethrough of the associated shipping cask. Generally a gas source connector is provided for establishing a gas pressure in the network of sealed tubing, and a pressure drop sensor is provided for detecting a drop in the gas pressure below a preset value.

Bzorgi, Fariborz M

2014-10-07T23:59:59.000Z

223

Cape Coral Youth Center Helps Light the Way to Energy Savings | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cape Coral Youth Center Helps Light the Way to Energy Savings Cape Coral Youth Center Helps Light the Way to Energy Savings Cape Coral Youth Center Helps Light the Way to Energy Savings May 18, 2011 - 4:32pm Addthis Cape Coral Youth Center Manager Mark Cagel stands in front of a tamper-proof thermostat at the Austen Youth Center in Cape Coral, Florida. | Photo Courtesy of the Cape Coral Youth Center Cape Coral Youth Center Manager Mark Cagel stands in front of a tamper-proof thermostat at the Austen Youth Center in Cape Coral, Florida. | Photo Courtesy of the Cape Coral Youth Center April Saylor April Saylor Former Digital Outreach Strategist, Office of Public Affairs What does this project do? Reduce the city's energy use by 40 percent over the next 15 years. Engineers able to research more efficient lighting techniques.

224

Audio Watermarking with Error Correction  

E-Print Network (OSTI)

In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of unauthorized distribution, as well as unauthorized tampering of copyrighted audio data is an important technological and research issue. Audio watermarking has been proposed as a solution to tackle this issue. The main purpose of audio watermarking is to protect against possible threats to the audio data and in case of copyright violation or unauthorized tampering, authenticity of such data can be disputed by virtue of audio watermarking.

Chadha, Aman; Goel, Rishabh; Dave, Hiren; Roja, M Mani

2011-01-01T23:59:59.000Z

225

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

226

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

227

Measuring the Emissions of Passing Cars  

Science Journals Connector (OSTI)

Measuring the Emissions of Passing Cars ... Pollutants found in car exhaust are formed in a number of different ways, depending on the pollutant. ... Of the 307 vehicles with complete data sets,19 126 (41%) showed deliberate tampering, another 77 had defective or missing equipment which may not have been deliberate (such as missing air pump belts), and 261 (85%) of the vehicles failed the tailpipe test. ...

G. A. Bishop; D. H. Stedman

1996-10-10T23:59:59.000Z

228

JOURNAL DE PHYSIQUE Colloque C7, suppl6ment au n012, Tome 49, dgcembre 1988  

E-Print Network (OSTI)

If the burn fraction of fuel in a cryogenic target of one-shell three-layers (lead tamper, aluminium pusher%. For such an optimized target, the ion-beam-energy and power radiating on target are required to be 6 MJ and 200 TW/cm2 respectively in order to realize Ti = 4 keV and R = 4 g/cm* for fuel. Spherical hollow shell target forms

Boyer, Edmond

229

Pathways Analysis for State Proliferators  

E-Print Network (OSTI)

. ............................................................... 110 Figure 60 Japan with both HEU and plutonium nodes activated ............................ 110 Figure 61 Japan with both HEU and plutonium nodes activated in addition to a tamper..., a uranium path and a plutonium path. The uranium path involves enrichment pathways and leads to either a gun type weapon or implosion type weapon. The plutonium path involves reactors and reprocessing facilities and leads to an implosion weapon...

Mella, Michael

2012-07-16T23:59:59.000Z

230

Protecting high value assets in transit  

SciTech Connect

This paper reports that one of the most daunting tasks facing a security manager is how to protect classified or high value assets such as nuclear materials in transit, especially when the shipment is to be handled by a commercial carrier. There are many opportunities for an adversary to gain access to cargo shipments en route, including situations in which the cargo must be held in storage for weeks or even months. Standard commercial alarm systems are not suitable for use in containers subject to vibration or high and low temperature extremes, or situations in which national assets might be used to gain surreptitious access to the container and to defeat the alarm system. A new alarm monitoring system has been developed to provide a secure auditing system for use in rail cars, Conex containers, and other transportable containers. The system, referred to as the PEL-100, electronically supervises intrusion detection sensors mounted on or within a container, and records all intrusion attempts in a secure, solid state memory storage device. The security archive can be withdrawn and reviewed after the container has completed its travels, and will provide a complete audit trail of intrusion attempts in transit. The PEL-100 includes one of the most comprehensive security tamper systems ever fielded, and is intended to operate reliably and securely in an environment subject to vibration, EMI/RFI emissions, electronic spoofing, and physical manipulation. The unit provides a clear and unambiguous indication of tampering and includes a comprehensive internal security system to detect insider tampering.

Tennefoss, M. (Stellar Systems, Inc. (US))

1991-01-01T23:59:59.000Z

231

Tags and seals for arms control verification  

SciTech Connect

Tags and seals have long been recognized as important tools in arms control. The trend in control of armaments is to limit militarily significant equipment that is capable of being verified through direct and cooperative means, chiefly on-site inspection or monitoring. Although this paper will focus on the CFE treaty, the role of tags and seals for other treaties will also be addressed. Published technology and concepts will be reviewed, based on open sources. Arms control verification tags are defined as unique identifiers designed to be tamper-revealing; in that respect, seals are similar, being used as indicators of unauthorized access. Tamper-revealing tags might be considered as single-point markers, seals as two-point couplings, and nets as volume containment. The functions of an arms control tag can be considered to be two-fold: to provide field verification of the identity of a treaty-limited item (TLI), and to have a means of authentication of the tag and its tamper-revealing features. Authentication could take place in the field or be completed elsewhere. For CFE, the goal of tags and seals can be to reduce the overall cost of the entire verification system.

DeVolpi, A.

1990-09-18T23:59:59.000Z

232

Preliminary Notice of Violation, Bechtel Jacobs - SEA-2010-01 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jacobs - SEA-2010-01 Jacobs - SEA-2010-01 Preliminary Notice of Violation, Bechtel Jacobs - SEA-2010-01 July 16, 2010 Preliminary Notice of Violation issued to Bechtel Jacobs Company, LLC, related to the Theft of Classified Matter from the East Tennessee Technology Park The Department of Energy's (DOE) Office of Health, Safety and Security's, Office of Enforcement has completed its investigation of Bechtel Jacobs Company, LLC (BJC) with respect to the theft of classified matter at the East Tennessee Technology Park (ETTP) in October 2006. Based on the on-site investigation and evaluation of the evidence in this matter, and in consideration of information you and your associates provided during an enforcement conference on August 18, 2009, I am issuing the enclosed Preliminary Notice of Violation (PNOV) in accordance with 10 C.F.R. §

233

Audit Letter Report: INS-L-07-05  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Department of Energy memorandum DATE February 2, 2007 REPLY TO A T ~ N O F IG-40 SUBJECT: Letter Report on "Alleged Loss or Theft of Personally Identifiable Infonnation at Pantex," INS-L-07-05 (S06IS037) TO. Manager, Pailtex Site Office This is to advise you of the results of an Office of Inspector General (OIG) inspection of an alleged loss or theft of personally identifiable information at the National Nuclear Security Administration's (NNSA's) Pantex Plant. BACKGROUND Under the Immigration Reform and Control Act of 1986, as amended by the Immigration and Nationality Act, all United States (U.S.) employers are required to obtain and retain information concerning each employee's eligibility to work in the U.S. The information to be collected generally consists of the employee's social security number, address, date of

234

Safeguards and Security Program  

Directives, Delegations, and Requirements

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

235

Using detection and deterrence to reduce insider risk  

SciTech Connect

This paper addresses a new concept of interaction between adversary detection and deterrence. It provides an initial evaluation of the effects of these variables on the risk of theft of special nuclear material by an insider adversary and can be extended to the sabotage threat. A steady-state risk equation is used. Exercises with this equation show that deterrence, resulting from the prospect of detection, has a greater ability to reduce the risk than the detection exercise itself. This is true for all cases except those in which the probability of detection is 1. Cases were developed for three different types of adversaries that can be distinguished from one another by the level of detection they are willing to tolerate before they are deterred from attempting a theft. By considering the effects of detection, deterrence, and adversary type, the ground work is laid for designing cost-effective insider threat-protection systems. 2 refs., 6 figs.

Eggers, R F; Carlson, R L; Udell, C J

1988-06-01T23:59:59.000Z

236

All regulations and procedures are subject to amendment. Page 1 of 3  

E-Print Network (OSTI)

that access or utilize covered data understand their responsibility with respect to complying with the GLBA 23 Federal Register, p. 346484) http://www.ftc.gov/os/2002/05/67fr36585.pdf New Jersey Identity Theft Prevention Act, NJSA 56:8-161 through 56:8-166, http://www.njleg.state.nj.us/2004/Bills/PL05/226_.HTM 50

Garfunkel, Eric

237

Weekly Security Incident Log Period of Apr 28 -May 4, 2014  

E-Print Network (OSTI)

member who was previously trespassed from campus several years prior. No further action was required. 5/2 transported the individual to hospital for further medical care. 5/2/2014 10:10 AM Emergency Medical 2014 in a washroom. 5/2/2014 03:18 PM Theft, Under Printed: 5/5/2014 4:13:20 PM 1Weekly Security Incident Log Period

238

Data:6009861a-e0e2-4cf3-b6c4-a6fa69100cac | Open Energy Information  

Open Energy Info (EERE)

1a-e0e2-4cf3-b6c4-a6fa69100cac 1a-e0e2-4cf3-b6c4-a6fa69100cac No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Moon Lake Electric Assn Inc Effective date: 2000/07/01 End date if known: Rate name: Street Lighting-Mercury Vapor-ASSOCIATION-OWNED SYSTEM 400W Sector: Lighting Description: Service includes energy, maintenance, lamp and glassware replacements. Lamps will be controlled to operate from dusk to dawn. Any damage resulting from vandalism shall be charged to the Consumer at cost of repair. Source or reference: http://www.moonlakeelectric.com/rates.html Source Parent: Comments Applicability

239

Energy Blog | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, 2010 4, 2010 Community members install the New Bohemia solar project in 2005 in Cedar Rapids, Iowa. | Photo courtesy of Rich Dana Solar equipment ravaged by floods gets new life Mounting the electrical equipment for a solar array 12 feet off the ground on the side of an art studio building seemed like a safe height at first: it would be well above the 100-year-flood mark and out of reach of vandals. May 24, 2010 Each classroom has a geothermal unit installed. Although large, the units blend into surroundings and don't produce excess noise. | Photo Courtesy of Sterling Public Schools Geothermal Systems are a Breath of Fresh Air for Illinois School District "Once we began researching possibilities, it didn't take us long to realize that our best option was geothermal energy."

240

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 8790 of 31,917 results. 81 - 8790 of 31,917 results. Article Solar equipment ravaged by floods gets new life Mounting the electrical equipment for a solar array 12 feet off the ground on the side of an art studio building seemed like a safe height at first: it would be well above the 100-year-flood mark and out of reach of vandals. http://energy.gov/articles/solar-equipment-ravaged-floods-gets-new-life Article Energy Department Offers Conditional Commitment to Support Nevada Geothermal Development with Recovery Act Funds Conditional Commitment to John Hancock Financial Services for Financing of NGP Blue Mountain Geothermal Project is First to Use DOE's Financial Institution Partnership Program http://energy.gov/articles/energy-department-offers-conditional-commitment-support-nevada-geothermal-development

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Data:41922f37-7eba-470f-90ce-65ef7d896711 | Open Energy Information  

Open Energy Info (EERE)

-7eba-470f-90ce-65ef7d896711 -7eba-470f-90ce-65ef7d896711 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Moon Lake Electric Assn Inc Effective date: 2000/07/01 End date if known: Rate name: Street Lighting-High Pressure Sodium-ASSOCIATION-OWNED SYSTEM 250W Sector: Lighting Description: Service includes energy, maintenance, lamp and glassware replacements. Lamps will be controlled to operate from dusk to dawn. Any damage resulting from vandalism shall be charged to the Consumer at cost of repair Source or reference: http://www.moonlakeelectric.com/rates.html Source Parent: Comments Applicability

242

Audit Report: IG-0750  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Federal Energy Regulatory Federal Energy Regulatory Commission's Program to Oversee Hydroelectric Dams DOE/IG-0750 December 2006 Department of Energy Washington, DC 20585 December 18, 2006 MEMORANDUM FOR THE CHAIRMAN, FEDERAL ENERGY FROM: Inspector General SUBJECT: INFORMATION: Audit Report on "The Federal Energy Regulatory Commission's Program to Oversee Hydroelectric Dams" BACKGROUND Pursuant to the Federal Power Act, the Federal Energy Regulatory Commission (FERC) regulates certain aspects of non-Federal hydroelectric dams. FERC is required to ensure the safety, stability. and integrity of these dams with the goal of protecting life, health, and property from, among other things, instances of sabotage and vandalism. To meet these requirements, FERC developed its Dam Safety and Security Programs to inspect and review

243

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, September 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Operations resume Operations resume (pg. 2) Y-12 resumes nuclear operations Aug. 15. Phased Array (pg. 5) A Y-12 project brings sweet success to weld inspections. September 2012 Visit us! Whether you've been a Y-12 employee for one year or 40 years, the events of July 28 had an effect on your time here. Y-12ers have always considered themselves a family, and like family, we must work together to regain the confidence of interested groups. We know three people cut through fences and vandalized the Highly Enriched Uranium Materials Facility July 28. As a result, B&W Y-12 ordered a temporary security stand-down. The National Nuclear Security Administration fully supported this step to ensure continued confidence in safe and secure operations. Nuclear operations resumed Aug. 15 (see pg. 2).

244

Microsoft Word - TR06-06.doc  

Office of Legacy Management (LM)

Site A/Plot M, Cook County, Illinois Site A/Plot M, Cook County, Illinois June 2008 Page 1 2008 Inspection and Annual Site Status Report for the Site A/Plot M, Cook County, Illinois Decontamination and Decommissioning Program Site Summary Site A/Plot M was inspected on April 25, 2008. The site, located within a county forest preserve with significant tree and grass cover, is in good condition. No cause for a follow-up inspection was identified. The historic monument at Plot M has been vandalized, as noted during previous inspections, but remains functional. Argonne National Laboratory (ANL) is in the process of decommissioning several monitor wells, and will provide a list and decommissioning documentation of the decommissioned monitor wells to DOE-LM. The need to label the outer surface of the protective casing of monitor wells with a well number

245

Audit Report: IG-0750 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IG-0750 IG-0750 Audit Report: IG-0750 December 18, 2006 The Federal Energy Regulatory Commission's Program to Oversee Hydroelectric Dams Pursuant to the Federal Power Act, the Federal Energy Regulatory Commission (FERC) regulates certain aspects of non-Federal hydroelectric dams. FERC is required to ensure the safety, stability. and integrity of these dams with the goal of protecting life, health, and property from, among other things, instances of sabotage and vandalism. To meet these requirements, FERC developed its Dam Safety and Security Programs to inspect and review safety and security efforts for about 2,600 dams. Of this number, over 900 are considered so significant or high hazard that if breached, loss of life and substantial economic and energy production disruption could result.

246

Data:9a6b1c4c-e734-4985-b082-6df7e1ad233d | Open Energy Information  

Open Energy Info (EERE)

b1c4c-e734-4985-b082-6df7e1ad233d b1c4c-e734-4985-b082-6df7e1ad233d No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Moon Lake Electric Assn Inc Effective date: 2000/01/01 End date if known: Rate name: YARD AND PROTECTIVE LIGHTING Sector: Lighting Description: Conditions for Service: Facilities involved are owned by the Association. The Association will provide at its expense all necessary labor and materials for repair and maintenance, except in the case of vandalism. The Association will perform necessary repair or maintenance at its earliest convenience and during normal working hours.

247

EA-1665: Davis-Kingman 69-kV Transmission Line Rebuild Project, Arizona |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Davis-Kingman 69-kV Transmission Line Rebuild Project, 65: Davis-Kingman 69-kV Transmission Line Rebuild Project, Arizona EA-1665: Davis-Kingman 69-kV Transmission Line Rebuild Project, Arizona Overview Western plans to rebuild a 26.6-mile-long portion of the existing 27.3-mile-long Davis-Kingman Tap 69-kV Transmission Line within the existing ROW in order to improve the reliability of the transmission service. The line has been in service well beyond its projected service life, customer load on the line has increased considerably over the years, and reliability has decreased due to natural aging, extreme weather exposure, vandalism, and lightning strikes. The western-most 0.7 mile of the existing line was rebuilt as part of the Davis Dam Switchyard in 2010. Public Comment Opportunities No public comment opportunities available at this time.

248

Data:284dda37-5b0f-4e74-92d3-d3f39618888e | Open Energy Information  

Open Energy Info (EERE)

dda37-5b0f-4e74-92d3-d3f39618888e dda37-5b0f-4e74-92d3-d3f39618888e No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Moon Lake Electric Assn Inc Effective date: 2000/07/01 End date if known: Rate name: Street Lighting-Mercury Vapor-ASSOCIATION-OWNED SYSTEM 250W Sector: Lighting Description: Service includes energy, maintenance, lamp and glassware replacements. Lamps will be controlled to operate from dusk to dawn. Any damage resulting from vandalism shall be charged to the Consumer at cost of repair. Source or reference: http://www.moonlakeelectric.com/rates.html Source Parent: Comments Applicability

249

Microsoft Word - HAT 2008-final.doc  

Office of Legacy Management (LM)

Mexican Hat, Utah Mexican Hat, Utah Page 12-1 12.0 Mexican Hat, Utah, Disposal Site 12.1 Compliance Summary The Mexican Hat, Utah, Uranium Mill Tailings Radiation Control Act (UMTRCA) Title I Disposal Site was inspected on April 29, 2008. The disposal cell and all associated surface water diversion and drainage structures were in excellent condition and functioning as designed. Runoff from storm events continues to transport sediment into the west diversion channel, resulting in low-density vegetation growth within the entire length of the channel; however, the performance of the diversion channel has not been impaired. Vandalism continues at the site as indicated by new bullets holes in several perimeter signs. The seismic monitoring station installed on site in 2007 as part of the EarthScope USArray Project continues to collect data.

250

Data:42d5826d-2149-4d2c-900b-e4061f5e75f4 | Open Energy Information  

Open Energy Info (EERE)

d-2149-4d2c-900b-e4061f5e75f4 d-2149-4d2c-900b-e4061f5e75f4 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Moon Lake Electric Assn Inc Effective date: 2000/07/01 End date if known: Rate name: Street Lighting-High Pressure Sodium-ASSOCIATION-OWNED SYSTEM 150W Sector: Lighting Description: Service includes energy, maintenance, lamp and glassware replacements. Lamps will be controlled to operate from dusk to dawn. Any damage resulting from vandalism shall be charged to the Consumer at cost of repair. Source or reference: http://www.mleainc.com/pdf/rates/rate_sch_sl.pdf Source Parent: Comments

251

Kuwait pressing toward preinvasion oil production capacity  

SciTech Connect

Oil field reconstruction is shifting focus in Kuwait as the country races toward prewar production capacity of 2 million b/d. Oil flow last month reached 1.7 million b/d, thanks largely to a massive workover program that has accomplished about as much as it can. By midyear, most of the 19 rigs in Kuwait will be drilling rather than working over wells vandalized by retreating Iraqi troops in February 1991. Seventeen gathering centers are at work, with capacities totaling 2.4 million b/d, according to state-owned Kuwait Oil Co. (KOC). This article describes current work, the production infrastructure, facilities strategy, oil recovery, well repairs, a horizontal pilot project, the drilling program, the constant reminders of war, and heightened tensions.

Tippee, B.

1993-03-15T23:59:59.000Z

252

SAS Output  

U.S. Energy Information Administration (EIA) Indexed Site

B. U.S. Transformer Sustained Automatic Outage Counts and Hours by Cause Code and by NERC Region, 2012 B. U.S. Transformer Sustained Automatic Outage Counts and Hours by Cause Code and by NERC Region, 2012 Transformer Outage Counts Sustained Outage Causes FRCC MRO NPCC RFC SERC SPP TRE WECC Contiguous U.S. Weather, excluding lightning -- -- -- -- 1.00 -- -- -- 1.00 Lightning -- -- -- -- -- -- -- -- -- Environmental -- -- -- -- -- -- -- -- -- Contamination 1.00 -- -- -- -- -- -- -- 1.00 Foreign Interference -- -- -- -- -- -- -- -- -- Fire -- -- -- -- -- -- -- -- -- Vandalism, Terrorism, or Malicious Acts -- -- -- -- -- -- -- -- -- Failed AC Substation Equipment 3.00 1.00 -- 1.00 5.00 -- -- 4.00 14.00 Failed AC/DC Terminal Equipment -- -- -- -- -- -- -- -- -- Failed Protection System Equipment -- 1.00 -- -- 3.00 -- -- -- 4.00

253

Data:8fd9d4ef-688a-48e0-88fb-3e93108c11d1 | Open Energy Information  

Open Energy Info (EERE)

fd9d4ef-688a-48e0-88fb-3e93108c11d1 fd9d4ef-688a-48e0-88fb-3e93108c11d1 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Wild Rice Electric Coop, Inc Effective date: 2012/03/18 End date if known: Rate name: AUTOMATIC YARD LIGHT SERVICE Sector: Lighting Description: The consumer shall be responsible for the reasonable care of the light, including repair of vandalism, damage or breakage. Moving or reinstalling of an existing light will be on a time and material basis with a minimum charge of $40.00. Posts and fixtures for ornamental installations will be paid for or provided by the consumer.

254

Containment & Surveillance Systems Laboratory (CSSL) | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Containment & Surveillance Systems Laboratory Containment & Surveillance Systems Laboratory May 30, 2013 The Containment and Surveillance Systems Laboratory is an arm of the highly acclaimed ORNL Safeguards Technology Integration Center. This lab is used to evaluate and develop custom technology, as well as integrate, mock up, and stage equipment for evaluation deployments for a variety of containment and surveillance applications. Activities in this lab focus on integrating technology for sealing, monitoring, and tracking nuclear material in a variety of environments. It is well suited for developing, integrating, and deploying active and passive tamper-indicating devices and enclosures, unattended and remote monitoring systems, and wired and wireless attribute-monitoring systems. Applications

255

Choosing and Using Seals  

NLE Websites -- All DOE Office Websites (Extended Search)

Appeared in Army Sustainment 44, 54-58 (2012) Appeared in Army Sustainment 44, 54-58 (2012) How to Choose and Use Seals Roger G. Jo rner, Ph.D. h a Vulnerabilit nston, Ph.D., CPP and Jon S. W y Assessment Team Argonne National Laboratory 9700 S. Cass Ave, Building 206 Argonne, IL 60439-4840 630-252-6168, rogerj@anl.gov Introduction Tamper-indicating seals have been in use for well over 7,000 years.[1,2] Today, seals are widely used for a variety of applications including cargo security, nuclear safeguards, counter-

256

Battery-operated air sampler for remote areas  

SciTech Connect

An air sampling system developed to evaluate air quality in biosphere reserves or in other remote areas is described. The equipment consists of a Dupont P-4000A pump and a specially designed battery pack containing Gates batteries. This air sampling system was tested in southern Utah and at 10 remote sampling sites in the Great Smoky Mountains National Park. The equipment was backpacked to the remote sampling sites, and was operated continuously at full capacity for a maximum 8-day period. Except for tampering by curious hikers at one site, the equipment operated satisfactorily.

Brown, K.W. (EPA Environmental Monitoring Systems Lab., Las Vegas, NV); Wiersma, G.B.; Frank, C.W.

1981-01-01T23:59:59.000Z

257

Seal system with integral detector  

DOE Patents (OSTI)

There is disclosed a seal system for materials where security is of the essence, such as nuclear materials, which is tamper-indicating, which indicates changes in environmental conditions that evidence attempts to by-pass the seal, which is unique and cost effective, said seal system comprised of a seal where an optical signal is transmitted through a loop, with a detector to read said signal, and one or more additional detectors designed to detect environmental changes, these detectors being operatively associated with the seal so that detection of a break in the optical signal or detection of environmental changes will cause an observable change in the seal.

Fiarman, Sidney (Port Jefferson, NY)

1985-01-01T23:59:59.000Z

258

An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks  

Science Journals Connector (OSTI)

Wireless Sensor Networks (WSNs) have been widely applied to sensing data from different environments. Owing to the resource limitations of WSNs, the data may be tampered easily during transmission. It may happen that data reach incorrect destinations or received incorrect data. It is an important issue for WSNs that base stations must receive correct data and ensure the data confidentiality. This paper proposes an efficient key management scheme and employs symmetric cryptography to secure the messages. In addition, we propose a secure routing protocol to provide a robust route. The proposed scheme further guarantees the destination should receive the data correctly.

Yu-Kai Hsiao; Ren-Junn Hwang

2010-01-01T23:59:59.000Z

259

The Superposition Principle in Quantum Mechanics - did the rock enter the foundation surreptitiously?  

E-Print Network (OSTI)

The superposition principle forms the very backbone of quantum theory. The resulting linear structure of quantum theory is structurally so rigid that tampering with it may have serious, seemingly unphysical, consequences. This principle has been succesful at even the highest available accelerator energies. Is this aspect of quantum theory forever then? The present work is an attempt to understand the attitude of the founding fathers, particularly of Bohr and Dirac, towards this principle. The Heisenberg matrix mechanics on the one hand, and the Schrodinger wave mechanics on the other, are critically examined to shed light as to how this principle entered the very foundations of quantum theory.

N. D. Hari Dass

2013-11-18T23:59:59.000Z

260

The Superposition Principle in Quantum Mechanics - did the rock enter the foundation surreptitiously?  

E-Print Network (OSTI)

The superposition principle forms the very backbone of quantum theory. The resulting linear structure of quantum theory is structurally so rigid that tampering with it may have serious, seemingly unphysical, consequences. This principle has been succesful at even the highest available accelerator energies. Is this aspect of quantum theory forever then? The present work is an attempt to understand the attitude of the founding fathers, particularly of Bohr and Dirac, towards this principle. The Heisenberg matrix mechanics on the one hand, and the Schrodinger wave mechanics on the other, are critically examined to shed light as to how this principle entered the very foundations of quantum theory.

Dass, N D Hari

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Rotary mechanical latch  

DOE Patents (OSTI)

A rotary mechanical latch for positive latching and unlatching of a rotary device with a latchable rotating assembly having a latching gear that can be driven to latched and unlatched states by a drive mechanism such as an electric motor. A cam arm affixed to the latching gear interfaces with leading and trailing latch cams affixed to a flange within the drive mechanism. The interaction of the cam arm with leading and trailing latch cams prevents rotation of the rotating assembly by external forces such as those due to vibration or tampering.

Spletzer, Barry L.; Martinez, Michael A.; Marron, Lisa C.

2012-11-13T23:59:59.000Z

262

Criminal Investigator | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Criminal Investigator Criminal Investigator Criminal Investigator Special Agent Responsibilities The Office of Investigations conducts investigations of DOE personnel, contractors, and others receiving DOE funds concerning alleged violations of law that impact DOE programs, operations, facilities, and personnel. Examples of issues investigated by the OIG include soliciting and/or accepting a bribe, overcharging the Government on contracts and grants, providing false data and information, supplying defective or inferior products, committing environmental violations, theft and/or destruction of government property, misuse of Government computers, serious employee misconduct, and ethical and conflict of interest violations. As a Special Agent, you will have authority to conduct criminal, civil, and

263

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

264

Special Audit Report on the Department of Energy's Arms and Military-type Equipment, IG-0385  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy memorandum DATE: February 1, 1996 REPLY TO ATTN TO: IG-1 SUBJECT: INFORMATION: "Special Audit Report on the Department of Energy's Arms and Military-Type Equipment" TO: The Secretary BACKGROUND: The Department of Energy is responsible for over 50 major facilities across the United States, many of which use and store nuclear and other sensitive materials. The Department maintains a large inventory of arms and military-type equipment to use in protecting its nuclear weapons, materials, facilities, and classified information against theft, sabotage, espionage, and terrorist activity. The Department's inventory of arms and military-type equipment included handguns, rifles, submachine guns, grenade

265

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

266

Inspection Report: IG-0660 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60 60 Inspection Report: IG-0660 August 30, 2004 Inspection Report on "Internal Controls Over the Accountability of Computers at Sandia National Laboratory, New Mexico The Office of Inspector General initiated an inspection to determine the adequacy of internal controls over the extensive inventory of laptop and desktop computers at Sandia National Laboratory, New Mexico. Computers are used in the full range of operations at Sandia, to include processing classified information. Department of Energy (DOE) and Sandia property policies identify computers as "sensitive property," due largely to their susceptibility to theft and misappropriation. Inspection Report: IG-0660 More Documents & Publications Inspection Report: IG-0597 Inspection Report: IG-0455

267

DOE-STD-1194-2011  

Energy.gov (U.S. Department of Energy (DOE))

Nuclear Materials Control and Accountability CHANGE NOTICE No. 2 (DECEMBER 2012) This document describes establishing and maintaining a Material Control and Accountability (MC&A) program, where each MC&A program element is a part of a quality MC&A program. Each site/facility operator needs to establish a sustainable, effective graded safeguards program for the control and accounting of nuclear materials to detect and deter theft and diversion, and to prevent the unauthorized control of a weapon, test device, or materials that can be used to make an improvised nuclear device.

268

Insider threat to secure facilities: data analysis  

SciTech Connect

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

269

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

270

Hybrid GPS-GSM Localization of Automobile Tracking System  

E-Print Network (OSTI)

An integrated GPS-GSM system is proposed to track vehicles using Google Earth application. The remote module has a GPS mounted on the moving vehicle to identify its current position, and to be transferred by GSM with other parameters acquired by the automobile's data port as an SMS to a recipient station. The received GPS coordinates are filtered using a Kalman filter to enhance the accuracy of measured position. After data processing, Google Earth application is used to view the current location and status of each vehicle. This goal of this system is to manage fleet, police automobiles distribution and car theft cautions.

Al-Khedher, Mohammad A

2012-01-01T23:59:59.000Z

271

US Department of Energy (DOE)/Gosatomnadzor (GAN) of Russia project at the Petersburg Nuclear Physics Institute (PNPI)  

SciTech Connect

This paper presents a summary of work accomplished within the scope of the DOE-Gosatomnadzor (GAN) Agreement to reduce vulnerability to theft of direct-use nuclear materials in Russia. The DOE-GAN agreement concerns the Russian Academy of Science B.P. Konstantinov Petersburg Nuclear Physics Institute (PNPI), located 45 kilometers from St. Petersburg. The PNPI operates facilities to research basic nuclear physics. Current world conditions require particular attention to the issue of Material Protection, Control, and Accounting (MPC&A) of nuclear materials. The long-term plan to increase security at the facility is outlined, including training, physical protection upgrades, and material control and accountability. 4 figs.

Baranov, I.A.; Konoplev, K.A. [Petersburg Nuclear Physics Institute, Gatchina (Russian Federation); Hauser, G.C. [Sandia National Lab., Albuquerque, NM (United States)] [and others

1997-08-01T23:59:59.000Z

272

Perimeter radiation monitors for the control and physical security of special nuclear materials  

SciTech Connect

Perimeter radiation monitors are gamma-ray and neutron measurement systems that can provide timely notice of theft or diversion of special nuclear material (SNM). The monitors may be hand-held instruments operated by security inspectors or automatic pedestrian or vehicle monitors located in exit pathways. A monitor's performance depends on its design, the characteristics of SNM and the operating environment, and proper monitor calibration and maintenance. Goals of ASTM Subcommittee C26.12 are to describe monitoring technology, how to apply it, and how to test its performance. 3 refs., 6 figs.

Fehlau, P.E.

1990-01-01T23:59:59.000Z

273

TrekISM Issue 61  

E-Print Network (OSTI)

's accused of philandering and jewel theft; meanwhile, Data tries to understand humor. Guest Cast: The Comic: Joe Piscopo; Captain O'Connor: William O. Campbell; Krushel of Stralin: Albert Stratton; Debon of Atlik: Douglas Rowe; Ynarra: Rosalind Ingledew...:TNG episodes. (The show seems to be growing on me -- or have the new members of the staff become more interesting? I even like Whoopi -- she had an excellent part in the episode that featured Wesley's new love interest [DAUPHIN]. The scene in the food...

1989-01-01T23:59:59.000Z

274

Mixcoin Anonymity for Bitcoin with accountable mixes  

E-Print Network (OSTI)

Abstract. We propose Mixcoin, a protocol to facilitate anonymous payments in Bitcoin and similar cryptocurrencies. We build on the emergent phenomenon of currency mixes, adding an accountability mechanism to expose theft. We demonstrate that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal. Our scheme is efficient and fully compatible with Bitcoin. Against a passive attacker, our scheme provides an anonymity set of all other users mixing coins contemporaneously. This is an interesting new property with no clear analog in better-studied communication mixes. Against active attackers our scheme offers similar anonymity to traditional communication mixes. 1

Joseph Bonneau; Arvind Narayanan; Andrew Miller; Jeremy Clark; Joshua A. Kroll; Edward W. Felten

275

Concealed identification symbols and nondestructive determination of the identification symbols  

DOE Patents (OSTI)

The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

Nance, Thomas A.; Gibbs, Kenneth M.

2014-09-16T23:59:59.000Z

276

Safeguards and Security Program  

Directives, Delegations, and Requirements

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

277

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

278

An Analysis of Anonymity in the Bitcoin System  

E-Print Network (OSTI)

Abstract—Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto-many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user’s node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin’s public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.

Fergal Reid; Martin Harrigan

1107-01-01T23:59:59.000Z

279

An Analysis of Anonymity in the Bitcoin System  

E-Print Network (OSTI)

Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

Reid, Fergal

2011-01-01T23:59:59.000Z

280

Safety, security and safeguard  

Science Journals Connector (OSTI)

Abstract A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks.

Nasiru Imam Zakariya; M.T.E. Kahn

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Data:Af3b1397-f479-491a-868a-c7767a15b987 | Open Energy Information  

Open Energy Info (EERE)

Af3b1397-f479-491a-868a-c7767a15b987 Af3b1397-f479-491a-868a-c7767a15b987 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 250W High Pressure Sodium -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

282

Data:B907a47a-2ebd-4252-a342-e22c259b938b | Open Energy Information  

Open Energy Info (EERE)

7a47a-2ebd-4252-a342-e22c259b938b 7a47a-2ebd-4252-a342-e22c259b938b No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 400W Metal Halide, Flood -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

283

Data:1cab31fd-2325-43b6-a85b-617baee6ff66 | Open Energy Information  

Open Energy Info (EERE)

cab31fd-2325-43b6-a85b-617baee6ff66 cab31fd-2325-43b6-a85b-617baee6ff66 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 400W Metal Halide, Flood -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

284

Data:9a164f94-b9bb-4654-bc28-435c307feeca | Open Energy Information  

Open Energy Info (EERE)

4f94-b9bb-4654-bc28-435c307feeca 4f94-b9bb-4654-bc28-435c307feeca No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 100W High Pressure Sodium -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

285

Data:3bf8d2f5-7573-4b55-9b97-6996759ffaef | Open Energy Information  

Open Energy Info (EERE)

d2f5-7573-4b55-9b97-6996759ffaef d2f5-7573-4b55-9b97-6996759ffaef No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 250W High Pressure Sodium, Flood -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

286

SAS Output  

U.S. Energy Information Administration (EIA) Indexed Site

A. U.S. Transmission Circuit Sustained Automatic Outage Counts and Hours by Cause Code and by NERC Region, 2012 A. U.S. Transmission Circuit Sustained Automatic Outage Counts and Hours by Cause Code and by NERC Region, 2012 AC & DC Circuit Outage Counts Sustained Outage Causes FRCC MRO NPCC RFC SERC SPP TRE WECC Contiguous U.S. Weather, excluding lightning 6.00 27.00 3.00 30.00 63.00 12.00 -- 69.00 210.00 Lightning 5.00 10.00 8.00 5.00 31.00 16.00 13.00 57.00 145.00 Environmental -- 1.00 1.00 5.00 -- 1.00 -- -- 8.00 Contamination 14.00 -- -- -- 22.00 3.00 6.00 7.00 52.00 Foreign Interference 34.00 3.00 -- 4.00 13.00 1.00 2.00 14.00 71.00 Fire -- 2.00 -- 1.00 6.00 3.00 1.00 85.00 98.00 Vandalism, Terrorism, or Malicious Acts -- -- -- -- 2.00 -- -- 1.00 3.00 Failed AC Substation Equipment 18.00 16.00 35.00 63.00 57.00 16.00 15.00 65.00 285.00

287

Data:98de151b-1d5d-4884-9580-551cb0d2045c | Open Energy Information  

Open Energy Info (EERE)

51b-1d5d-4884-9580-551cb0d2045c 51b-1d5d-4884-9580-551cb0d2045c No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 250W Metal Halide, Flood -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

288

Data:208f7ef3-cfb5-4748-a8d8-d569f0491c16 | Open Energy Information  

Open Energy Info (EERE)

f7ef3-cfb5-4748-a8d8-d569f0491c16 f7ef3-cfb5-4748-a8d8-d569f0491c16 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 400W Mercury Vapor -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

289

Data:Eb0ca68b-e5bc-4c3b-8301-737584d9ca18 | Open Energy Information  

Open Energy Info (EERE)

ca68b-e5bc-4c3b-8301-737584d9ca18 ca68b-e5bc-4c3b-8301-737584d9ca18 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 250W High Pressure Sodium -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

290

Data:2e1b1e4c-522d-4ba1-9ec3-c0d78cb0b47e | Open Energy Information  

Open Energy Info (EERE)

b1e4c-522d-4ba1-9ec3-c0d78cb0b47e b1e4c-522d-4ba1-9ec3-c0d78cb0b47e No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 100W High Pressure Sodium -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

291

Data:A4986fcc-f75a-404f-9fdc-614db53a03f7 | Open Energy Information  

Open Energy Info (EERE)

fcc-f75a-404f-9fdc-614db53a03f7 fcc-f75a-404f-9fdc-614db53a03f7 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 250W Metal Halide, Flood -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

292

Data:888bfe95-0df0-448d-9acb-571d263e39c2 | Open Energy Information  

Open Energy Info (EERE)

bfe95-0df0-448d-9acb-571d263e39c2 bfe95-0df0-448d-9acb-571d263e39c2 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 400W High Pressure Sodium, Flood -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

293

Data:D2feacd8-36c3-4655-b59c-579941a8eee4 | Open Energy Information  

Open Energy Info (EERE)

feacd8-36c3-4655-b59c-579941a8eee4 feacd8-36c3-4655-b59c-579941a8eee4 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 250W High Pressure Sodium, Flood -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

294

Data:90d8a14a-f202-49a6-9479-1b4082c4c939 | Open Energy Information  

Open Energy Info (EERE)

a14a-f202-49a6-9479-1b4082c4c939 a14a-f202-49a6-9479-1b4082c4c939 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 400W High Pressure Sodium, Flood -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

295

Data:7db38318-eb0e-4353-a5ba-5bf16d3e63e4 | Open Energy Information  

Open Energy Info (EERE)

db38318-eb0e-4353-a5ba-5bf16d3e63e4 db38318-eb0e-4353-a5ba-5bf16d3e63e4 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 175W Mercury Vapor -With Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

296

Day, night and all-weather security surveillance automation synergy from combining two powerful technologies  

SciTech Connect

Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

Morellas, Vassilios; Johnson, Andrew [Honeywell Labs, 3660, Technology Drive, Minneapolis MN 5518 (United States); Johnston, Chris [Honeywell ACS, 1985 Douglas Drive North, Golden Valley MN 55422 (United States); Roberts, Sharon D.; Francisco, Glen L. [L-3 Communications Infrared Products, 13532 N. Central Expressway, Dallas TX 75243 (United States)

2006-07-01T23:59:59.000Z

297

Investigation of the Roosevelt Road Transmitter Site, Fort Richardson, Alaska, using ground penetrating radar  

SciTech Connect

The Roosevelt Road Transmitter Site is the location of a decommissioned bunker on Fort Richardson, near Anchorage, Alaska. The site was used from World War II to the Korean War as part of an Alaskan communications network. The bunker and support buildings were vandalized following its decommissioning in the mid-1960s, resulting in PCB contamination of the bunker and soils around the above-ground transmitter annex. CRREL conducted a ground-penetrating radar (GPR) investigation of the site in June 1996, at the request of the Directorate of Public Works on Fort Richardson. Nine transect lines were established, each being profiled with 100- and 400-MHz antennas. Both antennas systems defined the extent of the bunker and identified the presence of buried utilities. The 100-MHz antenna provided large-scale resolution of the bunker, limits of site excavation, and large stratigraphic horizons in the undisturbed sediments. The 400-MHz antenna provided finer resolution that allowed identification of steel reinforcement in the bunker ceiling, utility walls and floor, and the walls of the inner and outer bunker. High amplitude resonance and hyperbolas in the record characterize the response from the Transmitter Annex foundation, buried pipes, and utilities. The GPR survey shows its utility for detecting the extent of abandoned underground structures and identifying the extent of original ground excavations.

Hunter, L.E.; Delaney, A.J.; Lawson, D.E.

1999-03-01T23:59:59.000Z

298

Data:4ed3157d-7ba5-4c44-afbe-dbfad0390461 | Open Energy Information  

Open Energy Info (EERE)

157d-7ba5-4c44-afbe-dbfad0390461 157d-7ba5-4c44-afbe-dbfad0390461 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 400W Mercury Vapor -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

299

Data:A720c823-97ef-4e50-8ed2-e8187e45df59 | Open Energy Information  

Open Energy Info (EERE)

c823-97ef-4e50-8ed2-e8187e45df59 c823-97ef-4e50-8ed2-e8187e45df59 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Foley Board of Utilities Effective date: 1990/01/01 End date if known: Rate name: Unmetered Outdoor Lighting- 175W Mercury Vapor -Without Pole Sector: Lighting Description: Dusk to dawn unmetered service is covered by charges set forth below which also cover initial installation of overhead lines, poles (where applicable), fixture assembly including four foot mounting hardware for standard luminaries and two foot mounting hardware for flood lights, and maintenance including lamp replacements due to burn outs. Such charges do not cover replacement of lamps, luminaries, brackets or overhead lines which are damaged or destroyed due to vandalism or any other cause beyond the Utility's control, such facilities damaged or destroyed under such circumstances to be replaced by the Utility at the Consumer's expense. Lamp renewals and required maintenance will be performed only during regular daytime working hours as soon as practical after notification by the Consumer of the necessity.

300

2013 ORNL Story Tips | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

13 13 2013 ORNL Story Tips 1-10 of 56 Results Prev 12345 Next Nonproliferation - Tell-tale seals December 05, 2013 - Using an Oak Ridge National Laboratory technology, inspectors of containers of nuclear material will be able to know with unprecedented confidence whether an intruder has tampered with a seal. The system uses a light source of entangled photons to verify the continuity of a fiber-based seal, according to Travis Humble, who led the development team. Cybersecurity - Foiling attackers December 05, 2013 - By frequently changing the Internet addresses of protected servers, Oak Ridge National Laboratory's Craig Shue has created a technology that thwarts attacks with just minor changes in infrastructure. Military - Tougher tanks December 05, 2013 - Improving welds of heavy and light armored fighting

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Nonproliferation - Tell-tale seals | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

SHARE SHARE Nonproliferation - Tell-tale seals Using an Oak Ridge National Laboratory technology, inspectors of containers of nuclear material will be able to know with unprecedented confidence whether an intruder has tampered with a seal. The system uses a light source of entangled photons to verify the continuity of a fiber-based seal, according to Travis Humble, who led the development team. Entanglement is a feature of quantum physics that describes how two spatially disparate systems exhibit strong correlations in otherwise independent behaviors. The work, sponsored by the Defense Threat Reduction Agency, is vital to ensure compliance with nonproliferation treaties because inspectors must confirm the uninterrupted containment and surveillance of any nuclear material.

302

Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fuel Fuel Vehicle Conversion to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion on Google Bookmark Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion on Delicious Rank Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel Vehicle Conversion on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel Vehicle Conversion It is unlawful to tamper with vehicle emissions control systems unless the

303

CX-005758: Categorical Exclusion Determination | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

58: Categorical Exclusion Determination 58: Categorical Exclusion Determination CX-005758: Categorical Exclusion Determination Testing of Son of SLITS (Secure Loop Inspectable Tag/Seal) Seal Designs CX(s) Applied: B3.6 Date: 05/04/2011 Location(s): Aiken, South Carolina Office(s): Environmental Management, Savannah River Operations Office Son of SLITS (Secure Loop Inspectable Tag/Seal) is a new design of a tamper indicating seal. Its design includes two components composed of acrylic or another similar plastic that will be adhered together by a Ultra Violet (UV) cured adhesive. The seal is designed to mix the one-part adhesive with specular hematite, which is finely ground iron oxide. DOCUMENT(S) AVAILABLE FOR DOWNLOAD CX-005758.pdf More Documents & Publications CX-003667: Categorical Exclusion Determination

304

Notice of Availability of the Remediation of the Moab Uranium Mill Tailings Final Environmental Impact Statement, Grand and San Juan Counties, Utah, Final Environmental Impact Statement (DOE/EIS-0355) (08/05/05)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 0 Federal Register / Vol. 70, No. 150 / Friday, August 5, 2005 / Notices that is cross referenced by the individual's name on a separate list. SAFEGUARDS: All physical access to the Department's site, and the site of the Department's contractor where this system of records is maintained, is controlled and monitored by security personnel. The computer system employed by the Department offers a high degree of resistance to tampering and circumvention. This computer system limits data access to Department and contract staff on a ''need to know'' basis, and controls individual users'' ability to access and alter records within the system. The contractor, Mathematica Policy Research, Inc. (MPR), has established a set of procedures to ensure confidentiality of data. The system

305

Browse by Discipline -- E-print Network Subject Pathways: Mathematics --  

Office of Scientific and Technical Information (OSTI)

U V W X Y Z U V W X Y Z Tesfatsion, Leigh (Leigh Tesfatsion) - Departments of Economics & Mathematics, Iowa State University Tinsley, Matt (Matt Tinsley) - School of Biological and Environmental Sciences, University of Stirling Toor, Saqib (Saqib Toor) - Department of Energy Technology, Aalborg University Tsao, Tsu-Chin (Tsu-Chin Tsao) - Mechanical and Aerospace Engineering Department, University of California at Los Angeles Tufte, Kristin (Kristin Tufte) - Department of Civil Engineering and Environmental Sciences, Portland State University Go back to Individual Researchers Collections: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Tampere University of Technology, Automation and Control Institute Texas A&M Transportation Institute, Southwest Region University

306

Browse by Discipline -- E-print Network Subject Pathways: Physics --  

Office of Scientific and Technical Information (OSTI)

H I J K L M N O P Q R S H I J K L M N O P Q R S T U V W X Y Z Gabbouj, Moncef (Moncef Gabbouj) - Institute of Signal Processing, Tampere University of Technology Gaborski, Roger S. (Roger S. Gaborski) - Department of Computer Science, Rochester Institute of Technology Gabriel, Edgar (Edgar Gabriel) - Department of Computer Science, University of Houston Gad-el-Hak, Mohamed (Mohamed Gad-el-Hak) - Department of Mechanical Engineering, Virginia Commonwealth University Gaeta, Alexander L. (Alexander L. Gaeta) - School of Applied and Engineering Physics, Cornell University Gajic, Zoran (Zoran Gajic) - Department of Electrical and Computer Engineering, Rutgers University Gales, Mark (Mark Gales) - Machine Intelligence Laboratory, Department of Engineering, University of Cambridge

307

A publication presented by the Electrical Safety Foundation International  

NLE Websites -- All DOE Office Websites (Extended Search)

presented by the Electrical Safety Foundation International presented by the Electrical Safety Foundation International A guide to understanding and maintaining your home's electrical system Should You Do-It-Yourself? Is a Permit or Inspection Required? How Much Energy Does My Home Use? How Does My Electrical System Work? What's Inside My Service Panel? What Kind of Wiring System is in My Home? Does My Home Have Grounded Outlets? What is a Tamper-Resistant Outlet? What is a GFCI? What is Energy Efficient Lighting? How Do I Clean Up a Broken CFL? Page 1 Page 2 Page 3 Page 4 Page 5-6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Everything you need to know What's Inside? Electrical Safety Foundation International The Electrical Safety Foundation International (ESFI)

308

Hardware device to physical structure binding and authentication  

DOE Patents (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

309

Hardware device binding and mutual authentication  

DOE Patents (OSTI)

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

310

A Zero Knowledge Protocol For Nuclear Warhead Verification  

SciTech Connect

The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

2014-03-14T23:59:59.000Z

311

Supplemental Systems for Unattended UF6 Cylinder Monitoring  

SciTech Connect

Cylinder assay and mass measurements, the mainstay of enrichment plant verification efforts have historically been performed by International Atomic Energy Agency (IAEA) inspectors using portable equipment. For the sake of efficiency, accuracy, and timeliness, such equipment is being supplanted by unattended measurement stations. Ancillary systems must be employed with such stations to ensure that measured parameters are properly recorded, cylinders are positively identified, operations occur according to procedure, and no tampering takes place in the inspectors’ absence. Depending on the facility, it may prove feasible to track cylinders from the measurement vicinity to their storage locations using surveillance. This paper will provide a cursory description of the various subsystems associated with Pacific Northwest National Laboratory’s Integrated Cylinder Verification Station and how inattention to the requirements of such systems could seriously diminish the capability of the integrated whole.

Curtis, Michael M.

2010-08-11T23:59:59.000Z

312

An integrated video- and weight-monitoring system for the surveillance of highly enriched uranium blend down operations  

SciTech Connect

An integrated video-surveillance and weight-monitoring system has been designed and constructed for tracking the blending down of weapons-grade uranium by the US Department of Energy. The instrumentation is being used by the International Atomic Energy Agency in its task of tracking and verifying the blended material at the Portsmouth Gaseous Diffusion Plant, Portsmouth, Ohio. The weight instrumentation developed at the Oak Ridge National Laboratory monitors and records the weight of cylinders of the highly enriched uranium as their contents are fed into the blending facility while the video equipment provided by Sandia National Laboratory records periodic and event triggered images of the blending area. A secure data network between the scales, cameras, and computers insures data integrity and eliminates the possibility of tampering. The details of the weight monitoring instrumentation, video- and weight-system interaction, and the secure data network is discussed.

Lenarduzzi, R.; Castleberry, K. [Oak Ridge National Lab., TN (United States); Whitaker, M. [Lockheed Martin Energy Systems, Oak Ridge, TN (United States); Martinez, R. [Sandia National Labs., Albuquerque, NM (United States)

1998-11-01T23:59:59.000Z

313

FRAMES-2.0 Software System: Providing Password Protection and Limited Access to Models and Simulations  

SciTech Connect

One of the most important concerns for regulatory agencies is the concept of reproducibility (i.e., reproducibility means credibility) of an assessment. One aspect of reproducibility deals with tampering of the assessment. In other words, when multiple groups are engaged in an assessment, it is important to lock down the problem that is to be solved and/or to restrict the models that are to be used to solve the problem. The objective of this effort is to provide the U.S. Nuclear Regulatory Commission (NRC) with a means to limit user access to models and to provide a mechanism to constrain the conceptual site models (CSMs) when appropriate. The purpose is to provide the user (i.e., NRC) with the ability to “lock down” the CSM (i.e., picture containing linked icons), restrict access to certain models, or both.

Whelan, Gene; Pelton, Mitch A.

2007-08-09T23:59:59.000Z

314

United States Government Memorandum  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Department of Energy United States Government Memorandum DATE: March 21, 2008 Audit Report Number: OAS-L-08-08 REPLY TO ATTN OF: IG-321 (A07LV042) SUBJECT: Audit Report on "Accountability of Sensitive and High Risk Property at the Nevada Site Office" TO: Acting Manager, Nevada Site Office INTRODUCTION AND OBJECTIVE and control over sensitive and high risk property because of the vulnerability to loss, theft or misuse and its potential impact on national security interests or proliferation concerns. Items such as portable and desktop computers, ammunition. and firearms are examples of sensitive property. In addition, federal regulations require that Departmental organizations and designated contractors account for and control govemroent-owned high risk property, such as body armor and gas masks,

315

Special Inquiry: IG-0584 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IG-0584 IG-0584 Special Inquiry: IG-0584 January 28, 2003 Operations at Los Alamos National Laboratory On November 18, 2002, the Office of Inspector General began a fact finding inquiry into allegations that senior management of the Los Alamos National Laboratory engaged in a deliberate cover-up of security breaches and illegal activities, in particular, with respect to reported instances of property loss and theft. The Acting Administrator of the National Nuclear Security Administration requested this inquiry based, in part, on media reports that Los Alamos employees had misused the Government purchase order system to buy millions of dollars worth of goods for personal use and that Los Alamos management had attempted to hide these events from the Department of Energy and the public.

316

Instrumented SSH on NERSC Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Security » Instrumented SSH Security » Instrumented SSH Instrumented SSH on NERSC Systems NERSC uses a modified version of SSH on all of our systems that allows us to record and analyze the content of interactive SSH sessions. Why are We Doing This? Credential theft represents the single greatest threat to security here at NERSC. We are addressing this problem by analyzing user command activity and looking for behavior that is recognizably hostile. Until SSH came into widespread use, it was trivial to monitor login sessions and analyze them for mischievous activity. Furthermore, this kind of intrusion detection proved to be very effective with few "false positives". Using this version of SSH at NERSC, we are simply recovering that capability. However, we recognize the importance of being candid about

317

SITEWIDE CATEGORICAL EXCLUSION FOR SAFETY AND SECURITY COMPONENT INSTALLATION AND ALTERATION, PACIFIC NORTHWEST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 8 SITEWIDE CATEGORICAL EXCLUSION FOR SAFETY AND SECURITY COMPONENT INSTALLATION AND ALTERATION, PACIFIC NORTHWEST NATIONAL LABORATORY, RICHLAND, WASHINGTON Proposed Action: The u.s. Department ofBnergy (DOE) Pacific Northwest Site Office (PNSO) proposes to install. alter, and/or maintain safety and security components to maintain an adequate protective planning stance. Loeation of Action: The proposed action would occur on the Pacific Northwest National Laboratory (PNNL) Site and in the vicinity ofPNNL facilities in the State of Washington. DacriptioD of the Proposed Action: DOE proposes to install, alter, and/or maintain safety and security systems to continue to provide appropriate levels of protection against unauthorized access, theft, diversion, loss

318

PowerPoint Presentation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented. Protect Remove and dispose of

319

How a Virus Prepares to Infect Cells | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Magnetic Switching under Pressure Magnetic Switching under Pressure Revealing the Secrets of Chemical Bath Deposition DNA Repair Protein Caught in the Act of Molecular Theft Velcro for Nanoparticles A Molecular Fossil Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed How a Virus Prepares to Infect Cells DECEMBER 8, 2010 Bookmark and Share This diagram depicts how the changing arrangement of proteins in a key structure enables viruses to invade and fuse with host cells. (Courtesy Purdue University Department of Biological Sciences image/Long Li) The atomic-scale arrangement of proteins in a structure that enables a virus to invade and fuse with host cells, showing precisely how the

320

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 15200 of 29,416 results. 91 - 15200 of 29,416 results. Rebate City of San Francisco- Green Building Code San Francisco adopted a mandatory green building code for new construction projects in September 2008, establishing strict guidelines for residential and commercial buildings according to the... http://energy.gov/savings/city-san-francisco-green-building-code Download The First Five Years FY 2004-2008 Office of Legacy Management: The First Five Years FY 2004-2008 http://energy.gov/lm/downloads/first-five-years-fy-2004-2008 Download Operating Guidelines Appendix A B.DOC http://energy.gov/management/downloads/operating-guidelines-appendix-bdoc0 Download An Updated Assessement of Copper Wire Thefts from Electric Utilities- October 2010 The U.S. Department of Energy (DOE), Office of Electricity Delivery and

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Security Operations, Laboratory Protection Division, Brookhaven National  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Operations Security Operations Homepage Brookhaven ID Badges, Passes, & Vehicle Stickers Hours of Operation Points of Contact Unclassified Foreign Visits and Assignments: FAQs BNL Site Access Main Gate Access Forms Security Operations L. Butera, Manager Brookhaven National Laboratory Bldg. 50 - P.O. Box 5000 Upton, NY 11973-5000 (631) 344-4691 E-mail: lbutera@bnl.gov Security Operations Mission Statement: To protect DOE special nuclear materials, classified matter, sensitive information, and certain sensitive property against theft, diversion, or destruction; to prevent the sabotage of programs that could result in significant scientific or financial impact; to prevent the malevolent release of hazardous materials including radiological, chemical, and infectious agents or other criminal acts that would endanger employees, the public, and the environment.

322

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 190 of 28,905 results. 81 - 190 of 28,905 results. Article U.S. Manufacturers Save $1 Billion, 11 Million Tons of CO2 through Energy Efficiency Investments Energy Department Releases Progress Update on Better Buildings, Better Plants Program http://energy.gov/articles/us-manufacturers-save-1-billion-11-million-tons-co2-through-energy-efficiency-investments Article Primus Power's Flow Battery Powered by $11 Million in Private Investment Investments in Primus Power's low-cost, distributed storage battery technology pave the way for increased integration of solar and wind technology into our nation's energy portfolio. http://energy.gov/articles/primus-power-s-flow-battery-powered-11-million-private-investment Download Investigation Letter Report: I11IG002 Impact of Copper Thefts on the Department of Energy

323

Management Alert: OAS-M-12-03 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OAS-M-12-03 OAS-M-12-03 Management Alert: OAS-M-12-03 March 23, 2012 Purchase of Computers for the U.S. Department of Agriculture Forest Service at the Savannah River Site In October 2011, the OIG received a complaint that the U.S. Department of Agriculture (Agriculture) Forest Service - Savannah River (Forest Service) had purchased a number of computers under its Interagency Agreement (Agreement) with the Department of Energy's (Department) Savannah River Operations Office (SRO) that were not placed into use and were being stored in a manner that left them vulnerable to theft or misuse. We confirmed the existence of 17 Hewlett-Packard desktop computers that had been purchased in September 2010, by the Forest Service with SRO funds, with the intention of connecting the computers to the Savannah River Site

324

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Error message Error message The page you requested does not exist. For your convenience, a search was performed using the query Flash2009 19. You are here Home » Page not found Page not found Oops! The page you are looking for doesn't seem to be available. Did you find a broken link? Tell us and we'll fix it. Or maybe you meant to go somewhere else? Use the search box or links below to help guide you. Enter terms Flash2009 19 Search Showing 461 - 470 of 9,640 results. Download Audit Letter Report: INS-L-07-05 Alleged Loss or Theft of Personally Identifiable Information at Pantex http://energy.gov/ig/downloads/audit-letter-report-ins-l-07-05 Article Grouting Operation to Lead to First SRS Waste Tank Closures Since 1997 AIKEN, S.C. - April marked the start of work to close two massive

325

Case No. VWA-0005  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05 05 * The original of this document contains information which is subject to withholding from disclosure under 5 U.S.C. 552. Such material has been deleted from this copy and replaced with XXXXX's. DECISION AND ORDER OF THE DEPARTMENT OF ENERGY Initial Agency Decision Names of Petitioners:Daniel L. Holsinger K-Ray Security, Inc. Date of Filing:December 6, 1995 Case Numbers: VWA-0005 VWA-0009 I. Introduction This Decision involves a complaint filed by Daniel L. Holsinger (Holsinger) under the Department of Energy (DOE) Contractor Employee Protection Program, 10 C.F.R. Part 708. In his complaint, Holsinger contends that certain reprisals were taken against him after he raised concerns relating to the possible theft of government property from the DOE's Morgantown Energy Technology Center (METC). These reprisals

326

Substance Abuse Testing Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » New Employee Orientation » Substance Abuse Testing Services » New Employee Orientation » Substance Abuse Testing Program Substance Abuse Testing Program Executive Order 12564, Drug-Free Federal Workplace, states in part that "the use of illegal drugs or the use of legal drugs illegally by Federal employees impairs the efficiency of Federal Agencies, jeopardizes public health and safety, and violates the public trust." Substance abuse increases the burden on other employees who do not use illegal drugs and also is an economic problem due to lost productivity in the workplace, insurance claims, sick benefits, accidents, and theft. Abusers endanger all who rely on them for their well being and safety. The Department's Substance Abuse Testing Program covers all Federal employees of the Department of Energy. Authorization for this program comes

327

Assessing the Risk of Arsenic Ingestion | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

An Electronic Dance of Spins and Orbits An Electronic Dance of Spins and Orbits How a Virus Prepares to Infect Cells Magnetic Switching under Pressure Revealing the Secrets of Chemical Bath Deposition DNA Repair Protein Caught in the Act of Molecular Theft Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Assessing the Risk of Arsenic Ingestion DECEMBER 17, 2010 Bookmark and Share Mineralogy, percent arsenic bioaccessibility and total arsenic concentration of samples from Nova Scotia mine tailings. Detailed mineralogical analyses of individual samples revealed up to seven arsenic species in individual samples (six shown here as major arsenic phases). Results of a physiologically based extraction test are for the < 150 ”m

328

Microsoft PowerPoint - 2-06_ Marra Pu solubility Tech Exchange - 1.ppt  

NLE Websites -- All DOE Office Websites (Extended Search)

the Solubility and Homogeneity the Solubility and Homogeneity of Plutonium in an Alkali Borosilicate Glass Jim Marra, Charles Crawford and Kevin Fox Savannah River National Laboratory EM Tech Exchange - Atlanta, GA Print Close 2 Outline * Background * Glass composition options * Vitrification processes * Hf as a surrogate for Pu in borosilicate glasses * Lanthanide borosilicate (LaBS) glass * Alkali borosilicate glass * Initial studies * Present study - Pu behavior in HLW glass * Pu behavior in the DWPF melter * Summary Print Close 3 Background * U.S. National Academy of Sciences, 1994 * U.S. and Russian surplus weapons Pu is a "clear and present danger" * U.S. to disposition up to 50 metric tons of surplus Pu * Protect surplus Pu from theft or diversion and reintroduction into nuclear arsenals * Bulk of U.S. material to be dispositioned by fabrication in

329

Inspection Report: IG-0597 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Inspection Report: IG-0597 April 24, 2003 Inspection of Internal Controls Over Personal Computers at Los Alamos National Laboratory Computers are used extensively in the full range of operations at the Los Alamos National Laboratory (LANL), including processing classified national security information. LANL reported an inventory of approximately 5,000 laptop and 30,000 desktop computers at the end of Fiscal Year (FY) 2002. Department of Energy (DOE) and LANL property policies identify computers as "sensitive property," due in part to their susceptibility to theft and potential for conversion to cash. It is an expected practice that management controls over computers throughout the DOE complex remain robust and consistent. Inspection Report: IG-0597

330

Magnetic Switching under Pressure | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Revealing the Secrets of Chemical Bath Deposition Revealing the Secrets of Chemical Bath Deposition DNA Repair Protein Caught in the Act of Molecular Theft Velcro for Nanoparticles A Molecular Fossil Ultrafast Imaging of Electron Waves in Graphene Science Highlights Archives: 2013 | 2012 | 2011 | 2010 2009 | 2008 | 2007 | 2006 2005 | 2004 | 2003 | 2002 2001 | 2000 | 1998 | Subscribe to APS Science Highlights rss feed Magnetic Switching under Pressure DECEMBER 2, 2010 Bookmark and Share A schematic representation of the pressure-induced magnetic switching effect. The colored images highlight the direction of the magnetic orbital (grey plane) for the copper centers (green balls: copper, blue: nitrogen, red: oxygen/water, yellow: fluoride). A material's properties are a critical factor in the way that material

331

Audit Report: OAS-M-08-01 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Audit Report: OAS-M-08-01 October 1, 2007 Management Controls over the Bonneville Power Administration's Personal Property Accountability Bonneville Power Administration (Bonneville) did not have effective controls over its personal property tracked through the Sunflower system. Specifically, we found that (1) equipment susceptible to loss or theft was not always entered into accountability; (2) inventory location information was not always accurate; (3) the existence of personal property items was not always validated when being transferred from one custodian to another; and, (4) inconsistencies in records regarding lost or stolen property were not reconciled. Audit Report: OAS-M-08-01 More Documents & Publications Semiannual Report to Congress: October 1, 2007 - March 31, 2008

332

Laboratory Protection Division, Brookhaven National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Points of Contact Points of Contact Organization Chart (pdf) Groups Emergency Services Emergency Management Security Operations BNL Site Access Main Gate Access Forms Welcome to the... Laboratory Protection Division (LP) Mission Statement: To serve and protect Brookhaven National Laboratory's staff, guests, and interests from the undesirable consequences of unwanted events by providing preparedness, assessment, engineering, and immediate response services for all types of security and non-security related emergencies. Protect DOE special nuclear materials, classified matter, sensitive information, and property against theft, diversion, or destruction; prevent the sabotage of programs that could result in significant scientific or financial impact; prevent the malevolent release of hazardous materials including radiological, chemical, and infectious agents or other criminal acts protecting people, property, and national security, providing a safe and secure environment for employees, the public, and the environment.

333

Geek-Up[6.17.2011]: Metallic Glass and 3D Plasmon Rulers | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7.2011]: Metallic Glass and 3D Plasmon Rulers 7.2011]: Metallic Glass and 3D Plasmon Rulers Geek-Up[6.17.2011]: Metallic Glass and 3D Plasmon Rulers June 17, 2011 - 5:41pm Addthis Check out a short animation of a 3D plasmon ruler as it delivers optical information about the structural dynamics of an attached protein and read more below. Niketa Kumar Niketa Kumar Public Affairs Specialist, Office of Public Affairs What does this mean for me? The discovery of a new property of glass offers new insight into the atomic structure and behavior of metallic glasses, which are in products such as anti-theft tags and power transformers. A new ruler could help provide scientists with unprecedented details into a variety of biological events, including the interaction between DNA and enzymes, protein folding and cell membrane vibrations.

334

Security and You, November 2912  

NLE Websites -- All DOE Office Websites (Extended Search)

Protecting Your Privacy Information Protecting Your Privacy Information Failure to protect Personally Identifiable Information (PII) can harm you. If your personal information falls into the wrong hands, your financial credit can be damaged, your bank account looted, and you may even find that you are the target of identity theft or worse. So, what exactly is PII? PII consists of information pertaining to an individual's education, financial information, medical history, criminal or employment background, or information which can be used to distinguish or trace their identity, such as their name associated with their social security number, date and place of birth, mother's maiden name, biometric records, etc. Examples of PII include but are not limited to: Name, such as full name, maiden name,

335

Audit Letter Report: INS-L-07-05 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 Audit Letter Report: INS-L-07-05 February 2, 2007 Alleged Loss or Theft of Personally Identifiable Information at Pantex Under the Immigration Reform and Control Act of 1986, as amended by the Immigration and Nationality Act, all United States (U.S.) employers are required to obtain and retain information concerning each employee's eligibility to work in the U.S. The information to be collected generally consists of the employee's social security number, address, date of birth, and other personally identifiable information sufficient to make an eligibility determination. At the time of employment, the information is to be recorded on Form I-9, Employment Eligibility Verification. Federal law requires that these forms be retained for three years after the date of

336

DOE-STD-1194-2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 02, 2013 October 02, 2013 Nuclear Materials Control and Accountability Change Notice 3 (October 2013) This document describes establishing and maintaining a Material Control and Accountability (MC&A) program, where each MC&A program element is a part of a quality MC&A program. Each site/facility operator needs to establish a sustainable, effective graded safeguards program for the control and accounting of nuclear materials to detect and deter theft and diversion, and to prevent the unauthorized control of a weapon, test device, or materials that can be used to make an improvised nuclear device. The MC&A program implements a defense-in-depth system to ensure that all accountable nuclear materials are in their authorized location and being used for their

337

Management Alert: OAS-M-12-03 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OAS-M-12-03 OAS-M-12-03 Management Alert: OAS-M-12-03 March 23, 2012 Purchase of Computers for the U.S. Department of Agriculture Forest Service at the Savannah River Site In October 2011, the OIG received a complaint that the U.S. Department of Agriculture (Agriculture) Forest Service - Savannah River (Forest Service) had purchased a number of computers under its Interagency Agreement (Agreement) with the Department of Energy's (Department) Savannah River Operations Office (SRO) that were not placed into use and were being stored in a manner that left them vulnerable to theft or misuse. We confirmed the existence of 17 Hewlett-Packard desktop computers that had been purchased in September 2010, by the Forest Service with SRO funds, with the intention of connecting the computers to the Savannah River Site

338

Office Of NONprOliferatiON  

National Nuclear Security Administration (NNSA)

Of NONprOliferatiON Of NONprOliferatiON aNd iNterNatiONal Security July 2011 www.nnsa.doe.gov National Nuclear Security Administration ENERGY U.S. DEPARTMENT OF Develop and implement DOE/NNSA nonproliferation and arms control policy to reduce the risk of weapons of mass destruction. control the spread of WMD-related material, equipment, technology and expertise. Safeguard and Secure nuclear material to prevent its diversion, theft and sabotage. Negotiate, monitor and verify compliance with international nonproliferation and arms control treaties and agreements. NNSA's Office of Nonproliferation and international Security (NiS) provides leadership in the formulation and implementation of nonproliferation, nuclear security and arms control

339

Notices  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 Federal Register 0 Federal Register / Vol. 76, No. 122 / Friday, June 24, 2011 / Notices CRA requirements. These requirements currently include transfer of data on lender interest benefits and special allowance payments, defaulted loan balances, and supplemental pre-claims assistance payments information. (13) Disclosure in the Course of Responding to Breach of Data. The Department may disclose records from this system to appropriate agencies, entities, and persons when: (a) The Department suspects or has confirmed that the security or confidentiality of information in the system of records has been compromised; (b) the Department has determined that as a result of the suspected or confirmed compromise there is a risk of harm to economic or property interests, identity theft or

340

Global Threat Reduction Initiative | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Restructuring the Indian power sector with energy conservation as the motive for economic and environmental benefits  

SciTech Connect

India's strong economic performance of recent years requires continuing effort from the newly formed Government to widen the ambit of economic reform. Though the Government has given higher priority for the power development projects, the Indian Power sector is struggling with formidable difficulties of meeting the heavy demands of electricity due to higher amount of power losses and energy thefts. To give a supporting hand to the Government, this paper suggests restructuring of the Power sector with energy conservation as the main motive to achieve economical and environmental benefits. The capabilities of the Energy Conservation Policies developed are illustrated via tests by three distinct ways on a State Grid alike Test System and the test results confirm the suitability of the proposed policies for real-time implementation on the Indian Power Sector.

Palanichamy, C.; Chelvan, R.K.; Babu, N.S.; Nadarajan, C.

1999-12-01T23:59:59.000Z

342

Examining the Risk of Nuclear Trafficking  

SciTech Connect

The need to stop illicit trafficking of nuclear and radioactive materials around the world is undeniable and urgent. This issue is particularly evident due to the highly dangerous consequences of the risks involved, the known interest of terrorist groups in acquiring such materials and the vulnerability of theft and diversion of such materials. Yet the phenomenon of nuclear trafficking remains a subject where the unknown dominates what is known on the subject. The trafficking panel at the Institute for Nuclear Materials Management (INMM) Workshop on Reducing the Risk of Radioactive and Nuclear Materials that took place in Albuquerque, New Mexico, March 10-11, 2009, dealt with some of the issues associated with nuclear trafficking. Different points of view on how to better address trafficking and thwart perpetrator efforts were discussed. This paper presents some of these views and addresses practical measures that should be considered to improve the situation.

Balatsky, Galya [Los Alamos National Laboratory; Severe, William R [Los Alamos National Laboratory; Schoeneck, Jeffery [DHS

2009-01-01T23:59:59.000Z

343

The Cyber Security Crisis  

SciTech Connect

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

344

DEVELOPMENT OF A METHODOLOGY TO ASSESS PROLIFERATION RESISTANCE AND PHYSICAL PROTECTION FOR GENERATION IV SYSTEMS  

SciTech Connect

Enhanced proliferation resistance and physical protection (PR&PP) is one of the technology goals for advanced nuclear concepts, such as Generation IV systems. Under the auspices of the Generation IV International Forum, the Office of Nuclear Energy, Science and Technology of the U.S. DOE, the Office of Nonproliferation Policy of the National Nuclear Security Administration, and participating organizations from six other countries are sponsoring an international working group to develop an evaluation methodology for PR&PP. This methodology will permit an objective PR&PP comparison between alternative nuclear systems (e.g., different reactor types or fuel cycles) and support design optimization to enhance robustness against proliferation, theft and sabotage. The paper summarizes the proposed assessment methodology including the assessment framework, measures used to express the PR&PP characteristics of the system, threat definition, system element and target identification, pathway identification and analysis, and estimation of the measures.

Nishimura, R.; Bari, R.; Peterson, P.; Roglans-Ribas, J.; Kalenchuk, D.

2004-10-06T23:59:59.000Z

345

Remote Sensing Laboratory - RSL  

ScienceCinema (OSTI)

One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

None

2015-01-09T23:59:59.000Z

346

Standard guide for application of radiation monitors to the control and physical security of special nuclear material  

E-Print Network (OSTI)

1.1 This guide briefly describes the state-of-the-art of radiation monitors for detecting special nuclear material (SNM) (see 3.1.11) in order to establish the context in which to write performance standards for the monitors. This guide extracts information from technical documentation to provide information for selecting, calibrating, testing, and operating such radiation monitors when they are used for the control and protection of SNM. This guide offers an unobtrusive means of searching pedestrians, packages, and motor vehicles for concealed SNM as one part of a nuclear material control or security plan for nuclear materials. The radiation monitors can provide an efficient, sensitive, and reliable means of detecting the theft of small quantities of SNM while maintaining a low likelihood of nuisance alarms. 1.2 Dependable operation of SNM radiation monitors rests on selecting appropriate monitors for the task, operating them in a hospitable environment, and conducting an effective program to test, calibrat...

American Society for Testing and Materials. Philadelphia

1999-01-01T23:59:59.000Z

347

The assess facility descriptor module  

SciTech Connect

The Facility Descriptor (Facility) module is part of the Analytic System and Software for Evaluating Safeguards and Security (ASSESS). Facility is the foundational software application in the ASSESS system for modelling a nuclear facility's safeguards and security system to determine the effectiveness against theft of special nuclear material. The Facility module provides the tools for an analyst to define a complete description of a facility's physical protection system which can then be used by other ASSESS software modules to determine vulnerability to a spectrum of insider and outsider threats. The analyst can enter a comprehensive description of the protection system layout including all secured areas, target locations, and detailed safeguards specifications. An extensive safeguard component catalog provides the reference data for calculating delay and detection performance. Multiple target locations within the same physical area may be specified, and the facility may be defined for two different operational states such as dayshift and nightshift. 6 refs., 5 figs.

Jordan, S.E.; Winblad, A.; Key, B.; Walker, S.; Renis, T.; Saleh, R.

1989-01-01T23:59:59.000Z

348

Report to Congress on abnormal occurrences, October--December 1993. Volume 16, No. 4  

SciTech Connect

Section 208 of the Energy Reorganization Act of 1974 identifies an abnormal occurrence as an unscheduled incident or event that the Nuclear Regulatory Commission determines to be significant from the standpoint of public health or safety and requires a quarterly report of such events to be made to Congress. This report covers the period from October 1 through December 31, 1993. This report discusses six abnormal occurrences at NRC-licensed facilities. Five involved medical brachytherapy misadministrations, and one involved an overexposure to a nursing infant. Seven abnormal occurrences that were reported by the Agreement States are also discussed, based on information provided by the Agreement States as of February 28, 1994. Of these events, three involved brachytherapy misadministrations, one involved a teletherapy misadministration, one involved a theft of radioactive material during transport and improper disposal, and two involved lost sources.

Not Available

1994-04-01T23:59:59.000Z

349

Risk Due to Radiological Terror Attacks With Natural Radionuclides  

Science Journals Connector (OSTI)

The naturally occurring radionuclides radium (Ra?226) and polonium (Po?210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling Theft and Orphan Radiation Sources (CSTO) operated at the University of Salzburg shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra?226 with conventional explosives (Dirty Bomb).

Steinhäusler Friedrich; Rydell Stan; Zaitseva Lyudmila

2008-01-01T23:59:59.000Z

350

Online Social Networks: Threats and Solutions Survey  

E-Print Network (OSTI)

Online social network users are unaware of the numerous security risks that exist in these networks, which can include privacy violations, identity theft, and sexual harassment, just to mention a few. According to recent studies, many online social network users readily expose personal and intimate details about themselves, such as relationship status, date of birth, school name, email, phone number, and even home addresses. This information, if fallen into the wrong hands, can be used to harm users, both in the virtual and in the real world. These risks become more severe when the users are children. In this paper we present a thorough survey on the different security and privacy risks which threaten the well-being of online social network users in general and children in particular. In addition, we present an overview of existing solutions that can provide better protection, security, and privacy for online social network users.

Fire, Michael; Elovici, Yuval

2013-01-01T23:59:59.000Z

351

Remote Sensing Laboratory - RSL  

SciTech Connect

One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

None

2014-11-06T23:59:59.000Z

352

Approach to proliferation risk assessment based on multiple objective analysis framework  

SciTech Connect

The approach to the assessment of proliferation risk using the methods of multi-criteria decision making and multi-objective optimization is presented. The approach allows the taking into account of the specifics features of the national nuclear infrastructure, and possible proliferation strategies (motivations, intentions, and capabilities). 3 examples of applying the approach are shown. First, the approach has been used to evaluate the attractiveness of HEU (high enriched uranium)production scenarios at a clandestine enrichment facility using centrifuge enrichment technology. Secondly, the approach has been applied to assess the attractiveness of scenarios for undeclared production of plutonium or HEU by theft of materials circulating in nuclear fuel cycle facilities and thermal reactors. Thirdly, the approach has been used to perform a comparative analysis of the structures of developing nuclear power systems based on different types of nuclear fuel cycles, the analysis being based on indicators of proliferation risk.

Andrianov, A.; Kuptsov, I. [Obninsk Institute for Nuclear Power Engineering of NNRU MEPhI (Russian Federation); Studgorodok 1, Obninsk, Kaluga region, 249030 (Russian Federation)

2013-07-01T23:59:59.000Z

353

A unique radioisotopic label as a new concept for safeguarding and tagging of long-term stored items and waste  

E-Print Network (OSTI)

The present paper discuss a novel method of tagging and labeling of waste casks, copper canisters, spent fuel containers, mercury containers, waste pack- ages and other items. In particular, it is related to the development of new long-term security identification tags/labels that can be applied to articles for carrying information about the content, inventory tracking, prevention of falsifi- cation and theft etc. It is suggested to use a unique combination of radioisotopes with different predictable length of life, as a label of the items. The possibil- ity to realize a multidimensional bar code symbology is proposed as an option for a new labeling method. The results of the first tests and evaluations of this are shown and discussed in the paper. The invention is suitable for use in items assigned to long-term (hundreds of years) storing or for final repositories. Alternative field of use includes fresh nuclear fuel handling and shipment of goods.

Dina Chernikova; Kare Axell

2013-12-06T23:59:59.000Z

354

A unique radioisotopic label as a new concept for safeguarding and tagging of long-term stored items and waste  

E-Print Network (OSTI)

The present paper discuss a novel method of tagging and labeling of waste casks, copper canisters, spent fuel containers, mercury containers, waste pack- ages and other items. In particular, it is related to the development of new long-term security identification tags/labels that can be applied to articles for carrying information about the content, inventory tracking, prevention of falsifi- cation and theft etc. It is suggested to use a unique combination of radioisotopes with different predictable length of life, as a label of the items. The possibil- ity to realize a multidimensional bar code symbology is proposed as an option for a new labeling method. The results of the first tests and evaluations of this are shown and discussed in the paper. The invention is suitable for use in items assigned to long-term (hundreds of years) storing or for final repositories. Alternative field of use includes fresh nuclear fuel handling and shipment of goods.

Dina Chernikova; Kare Axell

2015-01-15T23:59:59.000Z

355

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41 - 5950 of 31,917 results. 41 - 5950 of 31,917 results. Download EIS-0403: BLM Notice of Availability of Maps and Additional Public Scoping from the Programmatic Environmental Impact Statement (Second Scoping Period) Solar Energy Development in Six Southwestern States http://energy.gov/nepa/downloads/eis-0403-blm-notice-availability-maps-and-additional-public-scoping-programmatic Article New Research Center to Increase Safety and Power Output of U.S. Nuclear Reactors Team Uses Supercomputers to Improve Reactor Design and Performance http://energy.gov/articles/new-research-center-increase-safety-and-power-output-us-nuclear-reactors Download Preliminary Notice of Violation, Bechtel Jacobs- SEA-2010-01 Preliminary Notice of Violation issued to Bechtel Jacobs Company, LLC, related to the Theft of Classified Matter from the East Tennessee

356

An assessment of unforeseen losses resulting from inappropriate use of solar home systems in South Africa  

Science Journals Connector (OSTI)

Abstract One of the challenges to the sustainability of the Solar Home System (SHS) electrification program in South Africa is equipment theft. In response to this, communities susceptible to solar panel theft resort to mounting their panels flat on the ground so they can be looked after during the day and taken indoors at night for safe keeping. Other households use their security lights to illuminate their environment and provide security for pole and roof mounted solar panels at night. These actions have consequential effects on the performance of the SHS. Several studies have detected resentment from households regarding the low power quality from these systems. Most scientific contributions on the issue of low power from SHS have focused on the challenges based on the technical designs of the systems. The power losses due to the usage pattern of the system has not received much attention. This study therefore reports on the technical losses as a result of the deviation from the designed and installed specification of the system by the users in order to protect their systems. It also investigates the linkage between the technical and economic losses which affects the sustainability of SHS program. A case study was performed in Thlatlaganya village within Limpopo province in South Africa. Technical analysis using PVSYST solar software revealed that the energy output and performance of the battery is compromised as a result of these practices. Economic analysis indicates that the battery life and the economics of owning and operating SHS are affected negatively. The study recommends solutions to mitigate these losses, and proposes a cost effective way of optimizing the operation of SHS using a Bench-Rack system for mounting solar panels.

Chukwuma Leonard Azimoh; Fredrik Wallin; Patrik Klintenberg; Björn Karlsson

2014-01-01T23:59:59.000Z

357

Analysis and section of processes for the disposition of excess fissile material from nuclear weapon dismantlement in the United States  

SciTech Connect

The end of the cold war and the acceleration of nuclear disarmament efforts by the United States (US) and Russia are generating large quantities of surplus fissile nuclear materials that are no longer needed for military purposes. The safe and secure disposition of this surplus material to prevent theft or reuse in weapons has become a high priority for the US Department of Energy (USDOE). Many options exist for storage and disposition (use or disposal) of these surplus materials. The criteria, which have been developed from the basis for a preliminary ``screening`` of options, to eliminate from further consideration those options that do not meet minimal requirements. Factors, or attributes, contained in the screening and selection criteria include: (1) resistance to theft and diversion by unauthorized parties, (2) resistance to retrieval, extraction, and reuse by the host nation, (3) technical viability, (4) environmental, safety, and health impacts, (5) cost effectiveness, (6) timeliness, (7) fostering of progress and cooperation with Russia and others, (8) public and institutional acceptance, and (9) additional benefits. The evaluation of environmental impacts, in accordance with the US National Environmental Policy Ac (NEPA) process, is an integral part of the overall evaluation process. Because of the variety of physical and chemical forms of the nuclear material inventory, and because of the large number of possible disposition technologies and final forms, several hundred possible pathways to disposition have been defined and have undergone a systematic selection process. Also, because nuclear material disposition will have far ranging impacts, extensive public, in the form of public and stakeholder, input was integral to the selection process.

Myers, B.R.; Armantrout, G.A. [Lawrence Livermore National Lab., CA (United States); Erickson, R. [Los Alamos National Lab., NM (United States)

1995-02-01T23:59:59.000Z

358

Data:2881b5e7-01e8-4895-aeca-6ea1beaff90d | Open Energy Information  

Open Energy Info (EERE)

e7-01e8-4895-aeca-6ea1beaff90d e7-01e8-4895-aeca-6ea1beaff90d No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Elkhorn Rural Public Pwr Dist Effective date: 2013/01/01 End date if known: Rate name: SECURITY LIGHT RENTAL 100-watt sodium Sector: Lighting Description: AVAILABLE: To all customers. CHARACTER OF SERVICE: 1. The District will provide the yard light, install the same on Applicant's yard pole and will service and replace the lamp periodically and the yard light, when necessary, without cost to the Applicant. The District will maintain service and replace lamps only during normal working hours except in case of an emergency. If such services are required during times other than normal working hours, the Applicant agrees to pay for such services. 2. If the Applicant desires the farm yard light installed at a location other than the District's meter pole, the Applicant shall pay for or furnish all labor and all the necessary materials required to install the farm yard light on the Applicant's pole. In most cases, if not installed on meter pole and it is on an existing pole belonging to customer, there is no charge. 3. In the event the Applicant desires to have a second or third farm yard light installed at other locations than the District's meter or yard pole, the Applicant's obligations to the District are the same as outlined in paragraph 2. 4. Services and maintenance and replacements required and rendered by the District and which are free to the Applicant shall not be covered by this agreement if such services are necessitated by acts of vandalism. 5. All kwh will be run through the customer's meter and billed at the applicable rate.

359

Archaeological investigations on the Buckboard Mesa Road Project  

SciTech Connect

In 1986, the Desert Research Institute (DRI) conducted an archaeological reconnaissance of a new alignment for the Buckboard Mesa Road on the Nevada Test Site for the Department of Energy (DOE). During this reconnaissance, several archaeological sites of National Register quality were discovered and recorded including a large quarry, site 26Ny4892, and a smaller lithic scatter, site 26Ny4894. Analysis of the debitage at 26Ny4892 indicates that this area was used primarily as a quarry for relatively small cobbles of obsidian found in the alluvium. Lithic reduction techniques used here are designed for efficiently reducing small pieces of toolstone and are oriented towards producing flake blanks from small cores and bifacially reducing exhausted cores. Projectile point cross references indicate that the area has seen at least casual use for about 10,000 years and more sustained use for the last 3,000 years. Initial obsidian hydration measurements indicate sustained use of the quarry for about the last 3,000 years although the loci of activities appear to change over time. Based on this study, the DRI recommends that quarrying activities in the area of 26Ny4892 are sufficiently sampled and that additional investigations into that aspect of prehistoric activity in the area are not necessary. This does not apply to other aspects of prehistoric use. DRI recommends that preconstruction surveys continue to identify nonquarrying, prehistoric utilization of the area. With the increased traffic on the Buckboard Mesa Road, there is a greater potential for vandalism to sites of National Register-quality located near the road. The DRI recommends that during the orientation briefing the workers at the Test Site be educated about the importance of cultural resources and the need for their protection. 202 refs., 41 figs., 52 tabs.

Amick, D.S.; Henton, G.H.; Pippin, L.C.

1991-10-01T23:59:59.000Z

360

Performance Demonstration Program Plan for Nondestructive Assay for the TRU Waste Characterization Program. Revision 1  

SciTech Connect

The Performance Demonstration Program (PDP) for Nondestructive Assay (NDA) consists of a series of tests conducted on a regular frequency to evaluate the capability for nondestructive assay of transuranic (TRU) waste throughout the Department of Energy (DOE) complex. Each test is termed a PDP cycle. These evaluation cycles provide an objective measure of the reliability of measurements performed with TRU waste characterization systems. Measurement facility performance will be demonstrated by the successful analysis of blind audit samples according to the criteria set by this Program Plan. Intercomparison between measurement groups of the DOE complex will be achieved by comparing the results of measurements on similar or identical blind samples reported by the different measurement facilities. Blind audit samples (hereinafter referred to as PDP samples) will be used as an independent means to assess the performance of measurement groups regarding compliance with established Quality Assurance Objectives (QAOs). As defined for this program, a PDP sample consists of a 55-gallon matrix drum emplaced with radioactive standards and fabricated matrix inserts. These PDP sample components, once manufactured, will be secured and stored at each participating measurement facility designated and authorized by Carlsbad Area Office (CAO) under secure conditions to protect them from loss, tampering, or accidental damage.

None

1997-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Design and Test of an Event Detector for the ReflectoActive Seals System  

SciTech Connect

The purpose of this thesis was to research, design, develop and test a novel instrument for detecting fiber optic loop continuity and spatially locating fiber optic breaches. The work is for an active seal system called ReflectoActive Seals whose purpose is to provide real time container tamper indication. A Field Programmable Gate Array was used to implement a loop continuity detector and a spatial breach locator based on a high acquisition speed single photon counting optical time domain reflectometer. Communication and other control features were added in order to create a usable instrument that met defined requirements. A host graphical user interface was developed to illustrate system use and performance. The resulting device meets performance specifications by exhibiting a dynamic range of 27dB and a spatial resolution of 1.5 ft. The communication scheme used expands installation options and allows the device to communicate to a central host via existing Local Area Networks and/or the Internet.

Stinson, Brad J [ORNL

2006-05-01T23:59:59.000Z

362

Design and Test of an Event Detector and Locator for the ReflectoActive Seals System  

SciTech Connect

The purpose of this work was to research, design, develop and test a novel instrument for detecting fiber optic loop continuity and spatially locating fiber optic breaches. The work is for an active seal system called ReflectoActive{trademark} Seals whose purpose is to provide real time container tamper indication. A Field Programmable Gate Array was used to implement a loop continuity detector and a spatial breach locator based on a high acquisition speed single photon counting optical time domain reflectometer. Communication and other control features were added in order to create a usable instrument that met defined requirements. A host graphical user interface was developed to illustrate system use and performance. The resulting device meets performance specifications by exhibiting a dynamic range of 27dB and a spatial resolution of 1.5 ft. The communication scheme used expands installation options and allows the device to communicate to a central host via existing Local Area Networks and/or the Internet.

Stinson, Brad J [ORNL

2006-06-01T23:59:59.000Z

363

US/Russian program in materials protection, control and accounting at the RRC Kurchatov Institute: 1997--1998  

SciTech Connect

Six US Department of Energy Laboratories are carrying out a program of cooperation with the Russian Research Center Kurchatov Institute to improve nuclear material protection, control and accounting (MPC and A) at Kurchatov. In 1997--1998 the primary thrust of this program has been directed to Building 106, which houses a number of test reactors and critical facilities. Substantial improvements in physical protection, upgrades in the physical inventory taking procedures, installation of equipment for the computerized materials accounting system, and installation of nuclear material portal monitors and neutron-based measurement equipment are being carried out at this facility. Software for the computerized accounting system, named KI-MACS, has been developed at Kurchatov and the system has been fully integrated with the bar code printing and reading equipment, electronic scales, and nondestructive assay equipment provided under this program. Additional 1997--1998 activities at Kurchatov include continuation of a tamper indicating device program, vulnerability assessments of several facilities, hosting of a Russian-American Workshop on Fissile Material Control and Accountability at Critical Facilities, and the development of accounting procedures for transfers of nuclear materials between material balance areas.

Sukhoruchkin, V.; Rumyantsev, A.; Shmelev, V. [RRC Kurchatov Inst., Moscow (Russian Federation)] [and others

1998-12-31T23:59:59.000Z

364

Tags and seals for controling nuclear materials, Arms control and nonproliferation technologies. Second quarter 1993  

SciTech Connect

This issue of Arms Control and Nonproliferation Technologies summarizes demonstrations and addresses related topics. The first article, ``Basic Nuclear Material Control and Accountability Concepts as Might be Applied to the Uranium from the US-Russian HEU Purchase,`` describes safeguards sybsystems necessary for effective nuclear material safeguards. It also presents a general discussion on HEU-to-low-enrichment uranium (LEU) commingling processes and suggests applicable key measurement points. The second article, ``A Framework for Evaluating Tamper-Indicating-Device Technologies (TIDs),`` describes their uses, proper selection, and evaluation. The final three articles discuss the tags and seals applications and general characteristics of several nuclear material containers: the Type 30B uranium hexafluoride container, the AT-400R container, and the DOT Specification 6M container for SNM. Finally, the Appendix displays short descriptions and illustrations of seven tags and seals, including: the E-cup and wire seal, the python seal, the secure loop inspectable tag/seal (SLITS), bolt-and-loop type electronic identification devices, and the shrink-wrap seal.

Staehle, G; Talaber, C; Stull, S; Moulthrop, P [eds.

1993-12-31T23:59:59.000Z

365

Sandia technology. Volume 13, number 2 Special issue : verification of arms control treaties.  

SciTech Connect

Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

Not Available

1989-03-01T23:59:59.000Z

366

Battery Vent Mechanism And Method  

DOE Patents (OSTI)

Disclosed herein is a venting mechanism for a battery. The venting mechanism includes a battery vent structure which is located on the battery cover and may be integrally formed therewith. The venting mechanism includes an opening extending through the battery cover such that the opening communicates with a plurality of battery cells located within the battery case. The venting mechanism also includes a vent manifold which attaches to the battery vent structure. The vent manifold includes a first opening which communicates with the battery vent structure opening and second and third openings which allow the vent manifold to be connected to two separate conduits. In this manner, a plurality of batteries may be interconnected for venting purposes, thus eliminating the need to provide separate vent lines for each battery. The vent manifold may be attached to the battery vent structure by a spin-welding technique. To facilitate this technique, the vent manifold may be provided with a flange portion which fits into a corresponding groove portion on the battery vent structure. The vent manifold includes an internal chamber which is large enough to completely house a conventional battery flame arrester and overpressure safety valve. In this manner, the vent manifold, when installed, lessens the likelihood of tampering with the flame arrester and safety valve.

Ching, Larry K. W. (Littleton, CO)

2000-02-15T23:59:59.000Z

367

Battery venting system and method  

DOE Patents (OSTI)

Disclosed herein is a venting mechanism for a battery. The venting mechanism includes a battery vent structure which is located on the battery cover and may be integrally formed therewith. The venting mechanism includes an opening extending through the battery cover such that the opening communicates with a plurality of battery cells located within the battery case. The venting mechanism also includes a vent manifold which attaches to the battery vent structure. The vent manifold includes a first opening which communicates with the battery vent structure opening and second and third openings which allow the vent manifold to be connected to two separate conduits. In this manner, a plurality of batteries may be interconnected for venting purposes, thus eliminating the need to provide separate vent lines for each battery. The vent manifold may be attached to the battery vent structure by a spin-welding technique. To facilitate this technique, the vent manifold may be provided with a flange portion which fits into a corresponding groove portion on the battery vent structure. The vent manifold includes an internal chamber which is large enough to completely house a conventional battery flame arrester and overpressure safety valve. In this manner, the vent manifold, when installed, lessens the likelihood of tampering with the flame arrester and safety valve.

Casale, Thomas J. (Aurora, CO); Ching, Larry K. W. (Littleton, CO); Baer, Jose T. (Gaviota, CA); Swan, David H. (Monrovia, CA)

1999-01-05T23:59:59.000Z

368

Gas centrifuge enrichment plants inspection frequency and remote monitoring issues for advanced safeguards implementation  

SciTech Connect

Current safeguards approaches used by the IAEA at gas centrifuge enrichment plants (GCEPs) need enhancement in order to verify declared low enriched uranium (LEU) production, detect undeclared LEU production and detect high enriched uranium (BEU) production with adequate probability using non destructive assay (NDA) techniques. At present inspectors use attended systems, systems needing the presence of an inspector for operation, during inspections to verify the mass and {sup 235}U enrichment of declared cylinders of uranium hexafluoride that are used in the process of enrichment at GCEPs. This paper contains an analysis of how possible improvements in unattended and attended NDA systems including process monitoring and possible on-site destructive analysis (DA) of samples could reduce the uncertainty of the inspector's measurements providing more effective and efficient IAEA GCEPs safeguards. We have also studied a few advanced safeguards systems that could be assembled for unattended operation and the level of performance needed from these systems to provide more effective safeguards. The analysis also considers how short notice random inspections, unannounced inspections (UIs), and the concept of information-driven inspections can affect probability of detection of the diversion of nuclear material when coupled to new GCEPs safeguards regimes augmented with unattended systems. We also explore the effects of system failures and operator tampering on meeting safeguards goals for quantity and timeliness and the measures needed to recover from such failures and anomalies.

Boyer, Brian David [Los Alamos National Laboratory; Erpenbeck, Heather H [Los Alamos National Laboratory; Miller, Karen A [Los Alamos National Laboratory; Ianakiev, Kiril D [Los Alamos National Laboratory; Reimold, Benjamin A [Los Alamos National Laboratory; Ward, Steven L [Los Alamos National Laboratory; Howell, John [GLASGOW UNIV.

2010-09-13T23:59:59.000Z

369

NDCX-II target experiments and simulations  

Science Journals Connector (OSTI)

Abstract The ion accelerator NDCX-II is undergoing commissioning at Lawrence Berkeley National Laboratory (LBNL). Its principal mission is to explore ion-driven High Energy Density Physics (HEDP) relevant to Inertial Fusion Energy (IFE) especially in the Warm Dense Matter (WDM) regime. We have carried out hydrodynamic simulations of beam-heated targets for parameters expected for the initial configuration of NDCX-II. For metal foils of order one micron thick (thin targets), the beam is predicted to heat the target in a timescale comparable to the hydrodynamic expansion time for experiments that infer material properties from measurements of the resulting rarefaction wave. We have also carried out hydrodynamic simulations of beam heating of metallic foam targets several tens of microns thick (thick targets) in which the ion range is shorter than the areal density of the material. In this case shock waves will form and we derive simple scaling laws for the efficiency of conversion of ion energy into kinetic energy of fluid flow. Geometries with a tamping layer may also be used to study the merging of a tamper shock with the end-of-range shock. This process can occur in tamped, direct drive IFE targets.

J.J. Barnard; R.M. More; M. Terry; A. Friedman; E. Henestroza; A. Koniges; J.W. Kwan; A. Ng; P.A. Ni; W. Liu; B.G. Logan; E. Startsev; A. Yuen

2014-01-01T23:59:59.000Z

370

The ''Radiation continuity Checker'', an Instrument for Monitoring Nuclear Disarmament Treaty Compliance  

SciTech Connect

We describe the design, construction and performance of an instrument designed to monitor compliance with future arms control treaties. By monitoring changes in the gamma-ray spectrum emitted by a stored nuclear weapon, our device is able to sense perturbations in the contents of a weapon storage container that would indicate treaty non-compliance. Our instrument (dubbed the Radiation Continuity Checker or RCC) is designed to detect significant perturbations in the gamma-ray spectra (indicative of tampering) while storing no classified information about the weapon, and having a negligible ''false alarm rate''. In this paper we describe the technical details of two prototype instruments and describe the strategies we have adopted to perform signal processing in these instruments. Our first instrument prototype uses a scintillation spectrometer and a massive tungsten alloy collimator to reject the gamma-ray background. Our second prototype instrument makes use of an active collimation scheme employing a multiple detector Compton scatter approach to reject background radiation. The signal processing method we employ uses linear algorithms applied pulse by pulse. This eliminates the need for storage of pulse height spectra, which are in many cases classified.

A. Bernstein; B. A. Brunett; N. R. Hilton; J. C. Lund; J. M. Van Scyoc

2000-10-01T23:59:59.000Z

371

The US Support Program to IAEA Safeguards Priority of Containment and Surveillance  

SciTech Connect

The United States Support Program (USSP) priority for containment and surveillance (US) focuses on maintaining or improving the reliability and cost-effectiveness of C/S systems for IAEA safeguards, expanding the number of systems that are unattended and remotely monitored, and developing verification methods that help streamline the on-site inspection process. Existing IAEA C/S systems have evolved to become complex, integrated systems, which may include active seals, nondestructive assay (NDA) instruments, video cameras, and other sensors. These systems operate autonomously. They send analytical data to IAEA headquarters where it can be reviewed. These systems present challenges to the goals of improved system performance, standardization, reliability, maintainability, documentation, and cost effectiveness. One critical lesson from past experiences is the need for cooperation and common objectives among the IAEA, the developer, and the facility operator, to create a successful, cost effective system. Recent USSP C/S activities include Rokkasho Reprocessing Plant safeguard systems, production of a new shift register, numerous vulnerability assessments of C/S systems, a conduit monitoring system which identifies tampering of IAEA conduit deployed in the field, fiber optic seal upgrades, unattended monitoring system software upgrades, next generation surveillance system which will upgrade existing camera systems, and support of the IAEA's development of the universal nondestructive assay data acquisition platform.

Diaz,R.A.

2008-06-13T23:59:59.000Z

372

Best Practices for the Security of Radioactive Materials  

SciTech Connect

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

373

EVALUATION METHODOLOGY FOR PROLIFERATION RESISTANCE AND PHYSICAL PROTECTION OF GENERATION IV NUCLEAR ENERGY SYSTEMS: AN OVERVIEW.  

SciTech Connect

This paper provides an overview of the methodology approach developed by the Generation IV International Forum Expert Group on Proliferation Resistance & Physical Protection for evaluation of Proliferation Resistance and Physical Protection robustness of Generation IV nuclear energy systems options. The methodology considers a set of alternative systems and evaluates their resistance or robustness to a collection of potential threats. For the challenges considered, the response of the system to these challenges is assessed and expressed in terms of outcomes. The challenges to the system are given by the threats posed by potential proliferant States and sub-national adversaries on the nuclear systems. The characteristics of the Generation IV systems, both technical and institutional, are used to evaluate their response to the threats and determine their resistance against the proliferation threats and robustness against sabotage and theft threats. System response encompasses three main elements: (1) System Element Identification. The nuclear energy system is decomposed into smaller elements (subsystems) at a level amenable to further analysis. (2) Target Identification and Categorization. A systematic process is used to identify and select representative targets for different categories of pathways, within each system element, that actors (proliferant States or adversaries) might choose to use or attack. (3) Pathway Identification and Refinement. Pathways are defined as potential sequences of events and actions followed by the proliferant State or adversary to achieve its objectives (proliferation, theft or sabotage). For each target, individual pathway segments are developed through a systematic process, analyzed at a high level, and screened where possible. Segments are connected into full pathways and analyzed in detail. The outcomes of the system response are expressed in terms of PR&PP measures. Measures are high-level characteristics of a pathway that include information important to the evaluation methodology users and to the decisions of a proliferant State or adversary. They are first evaluated for segments and then aggregated for complete pathways. Results are aggregated as appropriate to permit pathway comparisons and system assessment. The paper highlights the current achievements in the development of the Proliferation Resistance and Physical Protection Evaluation Methodology. The way forward is also briefly presented together with some conclusions.

BARI, R.; ET AL.

2006-03-01T23:59:59.000Z

374

Data:Ea428b87-7a85-4113-b48c-3312a726b798 | Open Energy Information  

Open Energy Info (EERE)

Ea428b87-7a85-4113-b48c-3312a726b798 Ea428b87-7a85-4113-b48c-3312a726b798 No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Elkhorn Rural Public Pwr Dist Effective date: 2013/01/01 End date if known: Rate name: SECURITY LIGHT RENTAL 150-watt sodium Sector: Lighting Description: AVAILABLE: To all customers. CHARACTER OF SERVICE: 1. The District will provide the yard light, install the same on Applicant's yard pole and will service and replace the lamp periodically and the yard light, when necessary, without cost to the Applicant. The District will maintain service and replace lamps only during normal working hours except in case of an emergency. If such services are required during times other than normal working hours, the Applicant agrees to pay for such services. 2. If the Applicant desires the farm yard light installed at a location other than the District's meter pole, the Applicant shall pay for or furnish all labor and all the necessary materials required to install the farm yard light on the Applicant's pole. In most cases, if not installed on meter pole and it is on an existing pole belonging to customer, there is no charge. 3. In the event the Applicant desires to have a second or third farm yard light installed at other locations than the District's meter or yard pole, the Applicant's obligations to the District are the same as outlined in paragraph 2. 4. Services and maintenance and replacements required and rendered by the District and which are free to the Applicant shall not be covered by this agreement if such services are necessitated by acts of vandalism. 5. All kwh will be run through the customer's meter and billed at the applicable rate.

375

When Materials Matter--Analyzing, Predicting, and Preventing Disasters  

SciTech Connect

The mission of the Architectural Surety{trademark} program at Sandia National Laboratories is to assure the performance of buildings, facilities, and other infrastructure systems under normal, abnormal, and malevolent threat conditions. Through educational outreach efforts in the classroom, at conferences, and presentations such as this one, public and professional awareness of the need to defuse and mitigate such threats is increased. Buildings, airports, utilities, and other kinds of infrastructure deteriorate over time, as evidenced most dramatically by the crumbling cities and aging buildings, bridges, and other facility systems. Natural disasters such as tornadoes, earthquakes, hurricanes, and flooding also stress the materials and structural elements of the built environment. In addition, criminals, vandals, and terrorists attack federal buildings, dams, bridges, tunnels, and other public and private facilities. Engineers and architects are beginning to systematically consider these threats during the design, construction, and retrofit phases of buildings and infrastructures and are recommending advanced research in new materials and techniques. Existing building codes and standards do not adequately address nor protect the infrastructure or the public from many of these emerging threats. The activities in Sandia National Laboratories' Architectural Surety{trademark} efforts take a risk management approach to enhancing the safety, security, and reliability of the constructed environment. The technologies and techniques developed during Sandia's 50 years as the nation's lead laboratory for nuclear weapons surety are now being applied to assessing and reducing the vulnerability of dams, to enhancing the safety and security of staff in foreign embassies, and assuring the reliability of other federal facilities. High consequence surety engineering and design brings together technological advancements, new material requirements, systems integration, and risk management to improve the safety, security, and reliability of the as-built environment. The thrust of this paper is the role that new materials can play in protecting the infrastructure. Retrofits of existing buildings, innovative approaches to the design and construction of new facilities, and the mitigation of consequences in the event of an unpreventable disaster are some of the areas that new construction materials can benefit the Architectural Surety{trademark} of the constructed environment.

MATALUCCI,RUDOLPH V.; O'CONNOR,SHARON

2000-08-24T23:59:59.000Z

376

Data:02431e03-f559-4213-ae8f-efe5b6ca28bb | Open Energy Information  

Open Energy Info (EERE)

e03-f559-4213-ae8f-efe5b6ca28bb e03-f559-4213-ae8f-efe5b6ca28bb No revision has been approved for this page. It is currently under review by our subject matter experts. Jump to: navigation, search Loading... 1. Basic Information 2. Demand 3. Energy << Previous 1 2 3 Next >> Basic Information Utility name: Elkhorn Rural Public Pwr Dist Effective date: 2013/01/01 End date if known: Rate name: SECURITY LIGHT RENTAL 175-watt mercury vapor Sector: Lighting Description: AVAILABLE: To all customers. CHARACTER OF SERVICE: 1. The District will provide the yard light, install the same on Applicant's yard pole and will service and replace the lamp periodically and the yard light, when necessary, without cost to the Applicant. The District will maintain service and replace lamps only during normal working hours except in case of an emergency. If such services are required during times other than normal working hours, the Applicant agrees to pay for such services. 2. If the Applicant desires the farm yard light installed at a location other than the District's meter pole, the Applicant shall pay for or furnish all labor and all the necessary materials required to install the farm yard light on the Applicant's pole. In most cases, if not installed on meter pole and it is on an existing pole belonging to customer, there is no charge. 3. In the event the Applicant desires to have a second or third farm yard light installed at other locations than the District's meter or yard pole, the Applicant's obligations to the District are the same as outlined in paragraph 2. 4. Services and maintenance and replacements required and rendered by the District and which are free to the Applicant shall not be covered by this agreement if such services are necessitated by acts of vandalism. 5. All kwh will be run through the customer's meter and billed at the applicable rate.

377

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

378

Termination of Safeguards for Accountable Nuclear Materials at the Idaho National Laboratory  

SciTech Connect

Termination of safeguards ends requirements of Nuclear Material Control and Accountability (MC&A) and thereby removes the safeguards basis for applying physical protection requirements for theft and diversion of nuclear material, providing termination requirements are met as described. Department of Energy (DOE) M 470.4 6 (Nuclear Material Control and Accountability [8/26/05]) stipulates: 1. Section A, Chapter I (1)( q) (1): Safeguards can be terminated on nuclear materials provided the following conditions are met: (a) 'If the material is special nuclear material (SNM) or protected as SNM, it must be attractiveness level E and have a measured value.' (b) 'The material has been determined by DOE line management to be of no programmatic value to DOE.' (c) 'The material is transferred to the control of a waste management organization where the material is accounted for and protected in accordance with waste management regulations. The material must not be collocated with other accountable nuclear materials.' Requirements for safeguards termination depend on the safeguards attractiveness levels of the material. For attractiveness level E, approval has been granted from the DOE Idaho Operations Office (DOE ID) to Battelle Energy Alliance, LLC (BEA) Safeguards and Security (S&S). In some cases, it may be necessary to dispose of nuclear materials of attractiveness level D or higher. Termination of safeguards for such materials must be approved by the Departmental Element (this is the DOE Headquarters Office of Nuclear Energy) after consultation with the Office of Security.

Michael Holzemer; Alan Carvo

2012-04-01T23:59:59.000Z

379

1990 update for the applications guide to pedestrian SNM (special nuclear material) monitors  

SciTech Connect

The physical principles of special nuclear material (SNM) monitoring have not changed in the five years since the writing of the Los Alamos report, An Applications Guide to Pedestrian SNM Monitors (AL-10633-MS).'' However, during those years, there has been evidence for the start of significant change in the practice of SNM monitoring. Recently revised Department of Energy orders allow flexibility in selecting material-control measures by addressing both abrupt and protracted theft or diversion of SNM and by grading the material according to its attractiveness. Other new guideline on how to apply, test, and maintain SNM monitors and metal detectors are becoming available from the American Society for Testing and Materials. But perhaps the most noticeable change to the Applications Guide is in Part 3, the catalog of commercial pedestrian SNM monitors, where many obsolete entries have been replaced by new monitors. This update for the Applications Guide catalogs new pedestrian SNM monitors and discusses what is new and what is changing in the practice of SNM monitoring. 31 refs., 11 figs.

Fehlau, P.E.

1990-12-01T23:59:59.000Z

380

Integrated neutron/gamma-ray portal monitors for nuclear safeguards  

SciTech Connect

Radiation monitoring is one nuclear-safeguards measure used to protect against the theft of special nuclear materials (SNM) by pedestrians departing from SNM access areas. The integrated neutron/gamma-ray portal monitor is an ideal radiation monitor for the task when the SNM is plutonium. It achieves high sensitivity for detecting both bare and shielded plutonium by combining two types of radiation detector. One type is a neutron-chamber detector, comprising a large, hollow, neutron moderator that contains a single thermal-neutron proportional counter. The entrance wall of each chamber is thin to admit slow neutrons from plutonium contained in a moderating shield, while the other walls are thick to moderate fast neutrons from bare or lead-shielded plutonium so that they can be detected. The other type of detector is a plastic scintillator that is primarily for detecting gamma rays from small amounts of unshielded plutonium. The two types of detector are easily integrated by making scintillators part of the thick back wall of each neutron chamber or by inserting them into each chamber void. We compared the influence of the two methods of integration on detecting neutrons and gamma rays, and we examined the effectiveness of other design factors and the methods for signal detection as well.

Fehlau, P.E.

1993-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Safeguarding and Protecting the Nuclear Fuel Cycle  

SciTech Connect

International safeguards as applied by the International Atomic Energy Agency (IAEA) are a vital cornerstone of the global nuclear nonproliferation regime - they protect against the peaceful nuclear fuel cycle becoming the undetected vehicle for nuclear weapons proliferation by States. Likewise, domestic safeguards and nuclear security are essential to combating theft, sabotage, and nuclear terrorism by non-State actors. While current approaches to safeguarding and protecting the nuclear fuel cycle have been very successful, there is significant, active interest to further improve the efficiency and effectiveness of safeguards and security, particularly in light of the anticipated growth of nuclear energy and the increase in the global threat environment. This article will address two recent developments called Safeguards-by-Design and Security-by-Design, which are receiving increasing broad international attention and support. Expected benefits include facilities that are inherently more economical to effectively safeguard and protect. However, the technical measures of safeguards and security alone are not enough - they must continue to be broadly supported by dynamic and adaptive nonproliferation and security regimes. To this end, at the level of the global fuel cycle architecture, 'nonproliferation and security by design' remains a worthy objective that is also the subject of very active, international focus.

Trond Bjornard; Humberto Garcia; William Desmond; Scott Demuth

2010-11-01T23:59:59.000Z

382

Equipment for Anti- Electricity Stealing with Remote Monitoring  

E-Print Network (OSTI)

Abstract—The power theft monitoring is an important research in electric power system, and electricity-stealing prevention became a big problem to the electricity board. based on the kind of electricity-stealing and actual demand of prevention of stealing electricity, the equipment of electricity-stealing with remote monitoring is designed, with PIC microcontroller as the control core. In this the standard energy meter and user energy meter are used to calculate and judge whether electricity-stealing happen or not. Results of the user application show that the system not only realizes monitoring the behavior of electricity stealing, accurately recording the time of electricity-stealing occur and finish, the quantity of electricity-stealing and sends the information to the area field man through SMS to detect the electricity-stealer, but also realizes the behavior of electricity-stealing with remote monitoring, which is convenient for centralized management.In addition, the system offers a solving method to the data of meter reading.

Mr. Sudheer K. Reddy; Mr. Musthafa. P; Mr. K. Sakthidhasan

383

A new concept for safeguarding and labeling of long-term stored waste and its place in the scope of existing tagging techniques  

E-Print Network (OSTI)

The idea of a novel labeling method is suggested for a new way of long-term security identification, inventory tracking, prevention of falsification and theft of waste casks, copper canisters, spent fuel containers, mercury containers, waste packages and other items. The suggested concept is based on the use of a unique combination of radioisotopes with different predictable half life. As an option for applying the radioisotope tag to spent fuel safeguarding it is suggested to use a mixture of {\\alpha}-emitting isotopes, such as 241Am etc., with materials that easily undergo {\\alpha}-induced reactions with emission of specific {\\gamma}-lines. Thus, the existing problem of the disposing of smoke detectors or other devices [1] which contain radioisotopes can be addressed, indirectly solving an existing waste problem. The results of the first pilot experiments with two general designs of storage canisters, namely a steel container which corresponds to the one which is commonly used for long-term storing of mercu...

Chernikova, Dina

2014-01-01T23:59:59.000Z

384

Modelling and evaluating against the violent insider  

SciTech Connect

The violent insider threat poses a special challenge to facilities protecting special nuclear material from theft or diversion. These insiders could potentially behave as nonviolent insiders to deceitfully defeat certain safeguards elements and use violence to forcefully defeat hardware or personnel. While several vulnerability assessment tools are available to deal with the nonviolent insider, very limited effort has been directed to developing analysis tools for the violent threat. In this paper, we present an approach using the results of a vulnerability assessment for nonviolent insiders to evaluate certain violent insider scenarios. Since existing tools do not explicitly consider violent insiders, the approach is intended for experienced safeguards analysts and relies on the analyst to brainstorm possible violent actions, to assign detection probabilities, and to ensure consistency. We then discuss our efforts in developing an automated tool for assessing the vulnerability against those violent insiders who are willing to use force against barriers, but who are unwilling to kill or be killed. Specifically, we discuss our efforts in developing databases for violent insiders penetrating barriers, algorithms for considering the entry of contraband, and modelling issues in considering the use of violence.

Fortney, D.S.; Al-Ayat, R.A.; Saleh, R.A.

1991-07-01T23:59:59.000Z

385

The Security of Russia's Nuclear Arsenal: The Human Factor  

SciTech Connect

Assertions by the Russian military that all of their nuclear weapons are secure against theft and that nuclear units within the military are somehow insulated from the problems plaguing the Russian military should not be accepted uncritically. Accordingly, we should not give unwarranted credence to the pronouncements of military figures like Cal.-Gen. Igor Valynkin, Chief of the Defense Ministry's 12th Main Directorate, which oversees the country's nuclear arsenal. He contends that ''Russian nuclear weapons are under reliable supervision'' and that ''talk about the unreliability of our control over nuclear weapons has only one pragmatic goal--to convince international society that the country is incapable of maintaining nuclear safety and to introduce international oversight over those weapons, as it is done, for example, in Iraq.'' While the comparison to Iraq is preposterous, many analysts might agree with Valynkin's sanguine appraisal of the security of Russia's nuclear weapons. In contrast, I argue that the numerous difficulties confronting the military as a whole should cause concern in the West over the security of the Russian nuclear arsenal.

Ball, D.Y.

1999-10-12T23:59:59.000Z

386

Safeguards First Principles Initiative at the Nevada Test Site  

SciTech Connect

The Material Control and Accountability (MC&A) program at the Nevada Test Site (NTS) was selected as a test bed for the Safeguards First Principles Initiative (SFPI). The implementation of the SFPI is evaluated using the system effectiveness model and the program is managed under an approved MC&A Plan. The effectiveness model consists of an evaluation of the critical elements necessary to detect, deter, and/or prevent the theft or diversion of Special Nuclear Material (SNM). The modeled results indicate that the MC&A program established under this variance is still effective, without creating unacceptable risk. Extensive performance testing is conducted through the duration of the pilot to ensure the protection system is effective and no material is at an unacceptable risk. The pilot was conducted from January 1, 2007, through May 30, 2007. This paper will discuss the following activities in association with SFPI: 1. Development of Timeline 2. Crosswalk of DOE Order and SFPI 3. Peer Review 4. Deviation 5. MC&A Plan and Procedure changes 6. Changes implemented at NTS 7. Training 8. Performance Test

Geneva Johnson

2007-07-08T23:59:59.000Z

387

NUCLEAR MATERIAL ATTRACTIVENESS: AN ASSESSMENT OF MATERIAL ASSOCIATED WITH A CLOSED FUEL CYCLE  

SciTech Connect

This paper examines the attractiveness of materials mixtures containing special nuclear materials (SNM) associated with the various processing steps required for a closed fuel cycle. This paper combines the results from earlier studies that examined the attractiveness of SNM associated with the processing of spent light water reactor (LWR) fuel by various reprocessing schemes and the recycle of plutonium as a mixed oxide (MOX) fuel in LWR with new results for the final, repeated burning of SNM in fast-spectrum reactors: fast reactors and accelerator driven systems (ADS). The results of this paper suggest that all reprocessing products evaluated so far need to be rigorously safeguarded and provided moderate to high levels of physical protection. These studies were performed at the request of the United States Department of Energy (DOE), and are based on the calculation of "attractiveness levels" that has been couched in terms chosen for consistency with those normally used for nuclear materials in DOE nuclear facilities. The methodology and key findings will be presented. Additionally, how these attractiveness levels relate to proliferation resistance (e.g. by increasing impediments to the diversion, theft, or undeclared production of SNM for the purpose of acquiring a nuclear weapon), and how they could be used to help inform policy makers, will be discussed.

Bathke, C. G.; Ebbinghaus, B.; Sleaford, Brad W.; Wallace, R. K.; Collins, Brian A.; Hase, Kevin R.; Robel, Martin; Jarvinen, G. D.; Bradley, Keith S.; Ireland, J. R.; Johnson, M. W.; Prichard, Andrew W.; Smith, Brian W.

2010-06-11T23:59:59.000Z

388

FURTHER ASSESSMENTS OF THE ATTRACTIVENESS OF MATERIALS IN ADVANCED NUCLEAR FUEL CYCLES FROM A SAFEGUARDS PERSPECTIVE  

SciTech Connect

This paper summarizes the results of an extension to an earlier study [ ] that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) associated with the PUREX, UREX+, and COEX reprocessing schemes. This study focuses on the materials associated with the UREX, COEX, THOREX, and PYROX reprocessing schemes. This study also examines what is required to render plutonium as “unattractive.” Furthermore, combining the results of this study with those from the earlier study permits a comparison of the uranium and thorium based fuel cycles on the basis of the attractiveness of the SNM associated with each fuel cycle. Both studies were performed at the request of the United States Department of Energy (DOE), and are based on the calculation of “attractiveness levels” that has been couched in terms chosen for consistency with those normally used for nuclear materials in DOE nuclear facilities [ ]. The methodology and key findings will be presented. Additionally, how these attractiveness levels relate to proliferation resistance (e.g. by increasing impediments to the diversion, theft, undeclared production of SNM for the purpose of acquiring a nuclear weapon), and how they could be used to help inform policy makers, will be discussed.

Bathke, C. G.; Jarvinen, G. D.; Wallace, R. K.; Ireland, J. R.; Johnson, M. W.; Sleaford, Brad W.; Ebbinghaus, B. B.; Bradley, Keith S.; Collins, Brian A.; Smith, Brian W.; Prichard, Andrew W.

2008-10-01T23:59:59.000Z

389

The Changing Adventures of Mixed Low-Level Waste Disposal at the Nevada Test Site  

SciTech Connect

After a 15-year hiatus, the United States Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO) began accepting DOE off-site generated mixed low-level radioactive waste (MLLW) for disposal at the Nevada Test Site (NTS) in December 2005. This action was predicated on the acceptance by the Nevada Division of Environmental Protection (NDEP) of a waste analysis plan (WAP). The NNSA/NSO agreed to limit mixed waste disposal to 20,000 cubic meters (approximately 706,000 cubic feet) and close the facility by December 2010 or sooner, if the volume limit is reached. The WAP and implementing procedures were developed based on Hanford’s system of verification to the extent possible so the two regional disposal sites could have similar processes. Since the NNSA/NSO does not have a breaching facility to allow the opening of boxes at the site, verification of the waste occurs by visual inspection at the generator/treatment facility or by Real-Time-Radiography (RTR) at the NTS. This system allows the NTS to effectively, efficiently, and compliantly accept MLLW for disposal. The WAP, NTS Waste Acceptance Criteria, and procedures have been revised based on learning experiences. These changes include: RTR expectations; visual inspection techniques; tamper-indicating device selection; void space requirements; and chemical screening concerns. The NNSA/NSO, NDEP, and the generators have been working together throughout the debugging of the verification processes. Additionally, the NNSA/NSO will continue to refine the MLLW acceptance processes and strive for continual improvement of the program.

DOE /Navarro/NSTec

2007-02-01T23:59:59.000Z

390

Developing standard performance testing procedures for material control and accounting components at a site  

SciTech Connect

The condition of a nuclear material control and accountability system (MC&A) and its individual components, as with any system combining technical elements and documentation, may be characterized through an aggregate of values for the various parameters that determine the system's ability to perform. The MC&A system's status may be functioning effectively, marginally or not functioning based on a summary of the values of the individual parameters. This work included a review of the following subsystems, MC&A and Detecting Material Losses, and their respective elements for the material control and accountability system: (a) Elements of the MC&A Subsystem - Information subsystem (Accountancy/Inventory), Measurement subsystem, Nuclear Material Access subsystem, including tamper-indicating device (TID) program, and Automated Information-gathering subsystem; (b) Elements for Detecting Nuclear Material Loses Subsystem - Inventory Differences, Shipper/receiver Differences, Confirmatory Measurements and differences with accounting data, and TID or Seal Violations. In order to detect the absence or loss of nuclear material there must be appropriate interactions among the elements and their respective subsystems from the list above. Additionally this work includes a review of regulatory requirements for the MC&A system component characteristics and criteria that support the evaluation of the performance of the listed components. The listed components had performance testing algorithms and procedures developed that took into consideration the regulatory criteria. The developed MC&A performance-testing procedures were the basis for a Guide for MC&A Performance Testing at the material balance areas (MBAs) of State Scientific Center of the Russian Federation - Institute for Physics and Power Engineering (SSC RF-IPPE).

Scherer, Carolynn P [Los Alamos National Laboratory; Bushlya, Anatoly V [ROSATOM, RUSSIA; Efimenko, Vladimir F [IPPE, RUSSIA; Ilyanstev, Anatoly [IPPE, RUSSIA; Regoushevsky, Victor I [IPPE, RUSSIA

2010-01-01T23:59:59.000Z

391

Initial CTBT international monitoring system security findings and recommendations  

SciTech Connect

An initial security evaluation of the proposed International Monitoring System (IMS) suggests safeguards at various points in the IMS to provide reliable information to the user community. Modeling the IMS as a network of information processing nodes provides a suitable architecture for assessing data surety needs of the system. The recommendations in this paper include the use of public-key authentication for data from monitoring stations and for commands issued to monitoring stations. Other monitoring station safeguards include tamper protection of sensor subsystems, preservation of data (i.e. short-term archival), and limiting the station`s network services. The recommendations for NDCs focus on the need to provide a backup to the IDC for data archival and data routing. Safeguards suggested for the IDC center on issues of reliability. The production of event bulletins should employ {open_quotes}two-man{close_quotes} procedures. As long as the data maintains its integrity, event bulletins can be produced by NDCs as well. The effective use of data authentication requires a sound key management system. Key management systems must be developed for the authentication of data, commands, and event bulletins if necessary. It is recommended that the trust placed in key management be distributed among multiple parties. The recommendations found in this paper offer safeguards for identified vulnerabilities in the IMS with regard to data surety. However, several outstanding security issues still exist. These issues include the need to formalize and obtain a consensus on a threat model and a trust model for the IMS. The final outstanding security issue that requires in-depth analysis concerns the IDC as a potential single point of failure in the current IMS design.

Craft, R.L.; Draelos, T.J.

1996-08-01T23:59:59.000Z

392

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

393

Algorithm for detecting energy diversion. [Appendix contains an annotated bibliography  

SciTech Connect

The objective of this project was to investigate those factors influencing energy consumption and to develop advanced statistical algorithms and a corresponding computer program to aid utilities in identifying energy diversion by analyzing patterns of energy consumption and other factors readily available to the utility. This final report documents the development of the algorithms, the methodologies used in analyzing their validity, and the advantages and disadvantages of these methods that resulted from these analyses. In the internal study, the algorithms appear to discriminate diverters from the rest of the population. Problems were found that decreased the efficiency of the algorithms during the field investigation. These included the quality of the data used by the algorithms, and the incomplete description of diverters. For the external study 300 potential diverters were submitted to the participating utility for field investigation. They found many cases of vacancies, seasonal use, two cases of tampering, several of suspect nature, irregularities in billing, and a number of meter problems. The code development was not undertaken due to the inconclusive nature of the results obtained in the external validation of the algorithms. Two final recommendations are presented. The first, to create better profiles for diverters and nondiverters, a large sample investigation of electric utility customers should be conducted. This would eliminate selection bias problems perceived to be present in current data. The second provides a list of action items that can be taken by the utilities, to improve both present detection methods and any algorithms that may be developed in the future. 64 refs., 39 figs., 32 figs.

Altschul, R.E.; Janky, D.G.; Scholz, F.W.; Tjoelker, R.A.; Tosch, T.J.; Tosch, T.J. (Boeing Computer Services Co., Seattle, WA (United States))

1991-08-01T23:59:59.000Z

394

USE OF MAILBOX APPROACH, VIDEO SURVEILLANCE, AND SHORT-NOTICE RANDOM INSPECTIONS TO ENHANCE DETECTION OF UNDECLARED LEU PRODUCTION AT GAS CENTRIFUGE ENRICHMENT PLANTS.  

SciTech Connect

Current safeguards approaches used by the IAEA at gas centrifuge enrichment plants (GCEPs) need enhancement in order to detect undeclared LEU production with adequate detection probability. ''Mailbox'' declarations have been used in the last two decades to verify receipts, production, and shipments at some bulk-handling facilities (e.g., fuel-fabrication plants). The operator declares the status of his plant to the IAEA on a daily basis using a secure ''Mailbox'' system such as a secure tamper-resistant computer. The operator agrees to hold receipts and shipments for a specified period of time, along with a specified number of annual inspections, to enable inspector access to a statistically large enough population of UF{sub 6} cylinders and fuel assemblies to achieve the desired detection probability. The inspectors can access the ''Mailbox'' during randomly timed inspections and then verify the operator's declarations for that day. Previously, this type of inspection regime was considered mainly for verifying the material balance at fuel-fabrication, enrichment, and conversion plants. Brookhaven National Laboratory has expanded the ''Mailbox'' concept with short-notice random inspections (SNRIs), coupled with enhanced video surveillance, to include declaration and verification of UF{sub 6} cylinder operational data to detect activities associated with undeclared LEU production at GCEPs. Since the ''Mailbox'' declarations would also include data relevant to material-balance verification, these randomized inspections would replace the scheduled monthly interim inspections for material-balance purposes; in addition, the inspectors could simultaneously perform the required number of Limited-Frequency Unannounced Access (LFUA) inspections used for HEU detection. This approach would provide improved detection capabilities for a wider range of diversion activities with not much more inspection effort than at present.

BOYER, B.D.; GORDON, D.M.; JO, J.

2006-07-16T23:59:59.000Z

395

U.S. bioassay Intercomparison Studies Program at Oak Ridge National Lab  

SciTech Connect

The Intercomparison Studies Program (ISP) for in-vitro bioassay at Oak Ridge National Laboratory (ORNL) has been in place since May 1991. The ISP was originally created to fill a need in the Radiobioassay area at ORNL, specifically in the areas of Quality Control, Quality Assurance, and Performance Testing. In the beginning, this consisted of two or three laboratories working in a pilot intercomparison program. Once it was determined that this could work effectively, the program began to seek additional members to broaden the scope of the effort. The program became formalized with a quarterly report in January 1992. The ISP currently provides cross-check blind/double-blind samples spiked with known amounts of radioactivity to various Department of Energy (DOE) facilities, universities, and private industry organizations throughout the US. These samples can be packaged according to ORNL procedures (ORNL sample bottles, ORNL chain-of-custody forms, tamper seals etc.), for a single blind sample or according to the needs of a particular facility if the double-blind sample mode is to be maintained. In 1998, the customer base was broadened to include European facilities. In January 1993, the whole-body count program was added. This involves each participating facility receiving a block phantom from the ISP and determining a geometry factor using a known standard. At quarterly intervals, each participant receives an unknown sample for analysis. The sample is counted and the data is collected for publication in an annual report. In October 1994, the fecal program was added. This involves spiking an artificial matrix with known amounts of radioactivity. Laboratories receive unknown samples on a quarterly basis. The sample is counted and the data is collected and published in a quarterly report. The ISP maintains archive samples which can be analyzed in the QC laboratory at the request of any participants if a conflict or discrepancy in a sample analysis/result occurs.

Payne, G.F.; Bores, N.; Melton, K.K.; Rankin, J.M.

1998-06-01T23:59:59.000Z

396

Implementation of a Dual Containment/Surveillance System utilizing scene-change detection and radio frequency technology  

SciTech Connect

This paper will examine the implementation of scene-change detection and radio frequency technology within a Dual Containment/Surveillance (C/S) System. Additionally, this paper will examine the human performance factors in the operation of these systems. Currently, Westinghouse Savannah River Company utilizes the Continuous Item Monitoring and Surveillance System (CIMS) in the performance of Dual C/S to monitor special nuclear materials within International Atomic Energy Agency (IAEA) Safeguards and Domestic Safeguards. CIMS is comprised of the Material Monitoring System (MMS) (R), a multi-media electronic surveillance system developed by Sandia National Laboratory which incorporates the use of active seals commonly called Radio Frequency Tamper Indicating Devices (RFTIDs), NT Vision (R) as developed by Los Alamos National Laboratory, a Microsoft Windows NT (R) based operating system providing for domestic scene-change detection and the Digital Multi-Camera Optical Surveillance System (DMOS) (R) which provides scene-change detection for IAEA. Although this paper will focus on the implementation of Dual C/S utilizing the Continuous Item Monitoring and Surveillance System, the necessity for a thorough review of Safeguards and Security requirements with organizations and personnel having minimal to no prior MPC&A training will also be covered. Successful Dual C/S implementation plans must consider not only system design and failure modes, but must also be accompanied with the appropriate ''mind shift'' within operations and technical personnel. This is required to ensure completion of both physical and electronic activities, and system design changes are performed conscientiously and with full awareness of MPC&A requirements.

FITZGERALD, ERIC; KOENIG, RICHARD

2005-06-27T23:59:59.000Z

397

Test and evaluation of computerized nuclear material accounting methods. Final report  

SciTech Connect

In accordance with the definition of a Material Balance Area (MBA) as a well-defined geographical area involving an Integral operation, the building housing the BFS-1 and BFS-1 critical facilities is considered to consist of one MBA. The BFS materials are in the form of small disks clad in stainless steel and each disk with nuclear material has its own serial number. Fissile material disks in the BFS MBA can be located at three key monitoring points: BFS-1 facility, BFS-2 facility and main storage of BFS fissile materials (storage 1). When used in the BFS-1 or BFS-2 critical facilities, the fissile material disks are loaded in tubes (fuel rods) forming critical assembly cores. The following specific features of the BFS MBA should be taken into account for the purpose of computerized accounting of nuclear material: (1) very large number of nuclear material items (about 70,000 fissile material items); and (2) periodically very intensive shuffling of nuclear material items. Requirements for the computerized system are determined by basic objectives of nuclear material accounting: (1) providing accurate information on the identity and location of all items in the BFS material balance area; (2) providing accurate information on location and identity of tamper-indicating devices; (3) tracking nuclear material inventories; (4) issuing periodic reports; (5) assisting with the detection of material gains or losses; (6) providing a history of nuclear material transactions; (7) preventing unauthorized access to the system and data falsification. In August 1995, the prototype computerized accounting system was installed on the BFS facility for trial operation. Information on two nuclear material types was entered into the data base: weapon-grade plutonium metal and 36% enriched uranium dioxide. The total number of the weapon-grade plutonium disks is 12,690 and the total number of the uranium dioxide disks is 1,700.

NONE

1995-12-31T23:59:59.000Z

398

Job Satisfaction, Disgruntlement and Insider Risk  

SciTech Connect

The prediction of future events and trends was the purview of fortune tellers and science writers; however futuristic studies are now an acceptable form of sociological research including workplace dynamics. The nuclear industry is also affected by workplace trends which currently indicate that there will be fewer jobs and individuals who are employed will be required to have greater technical skills. This reshaping of the workforce is partially due to an aging workforce and diversity within the work environment. The reshaping brings with it the need for greater productivity and employee expectations for increased pay and/or benefits. If employee satisfaction is not realized there is a real possibility of disgruntled employees who then become a potential insider risk to the organization. Typically this is an individual who has been employed for several years, becomes dissatisfied with the job, or some other aspect of their life. If the dissatisfaction is directly related to work the individual may retaliate in a destructive manner. Perceived inequities are a major factor and directly related to situational pressures, opportunity, and personal integrity. It is known that the greatest losses within an organization are attributed to employees working alone or in a conspiracy with fellow employees who engage in theft and other fraudulent activities. In the nuclear industry this threat is intensified by the nature of the work, the materials employees come in contact with and the potential of an occurrence that could adversely affect a large geographic region and/or the security of a country. The paper will address motivating factors, recommendations, and include a profile discussion of a possible disgruntled employee.

Eisele, Gerhard R [ORNL] [ORNL; Coates, Cameron W [ORNL] [ORNL

2010-01-01T23:59:59.000Z

399

The Ural Electrochemical Integrated Plant Process for Managing Equipment Intended for Nuclear Material Protection, Control and Accounting System Upgrades  

SciTech Connect

Since 1996, the Ural Electrochemical Integrated Plant (UEIP) located in the town of Novouralsk, Russia, (previously known as Sverdlovsk-44) and the United States Department of Energy (U.S. DOE) have been cooperating under the Nuclear Material Protection, Control and Accounting (MPC&A) Program. Because UEIP is involved in the processing of highly enriched uranium (HEU) into low enriched uranium (LEU), and there are highly enriched nuclear materials on its territory, the main goal of the MPC&A cooperation is to upgrade those systems that ensure secure storage, processing and transportation of nuclear materials at the plant. UEIP has completed key upgrades (equipment procurement and installation) aimed at improving MPC&A systems through significant investments made by both the U.S. DOE and UEIP. These joint cooperative efforts resulted in bringing MPC&A systems into compliance with current regulations, which led to nuclear material (NM) theft risk reduction and prevention from other unlawful actions with respect to them. Upon the U.S. MPC&A project team’s suggestion, UEIP has developed an equipment inventory control process to track all the property provided through the MPC&A Program. The UEIP process and system for managing equipment provides many benefits including: greater ease and efficiency in determining the quantities, location, maintenance and repair schedule for equipment; greater assurance that MPC&A equipment is in continued satisfactory operation; and improved control in the development of a site sustainability program. While emphasizing UEIP’s equipment inventory control processes, this paper will present process requirements and a methodology that may have practical and helpful applications at other sites.

Yuldashev, Rashid; Nosov, Andrei; Carroll, Michael F.; Garrett, Albert G.; Dabbs, Richard D.; Ku, Esther M.

2008-10-01T23:59:59.000Z

400

A framework and methodology for nuclear fuel cycle transparency.  

SciTech Connect

A key objective to the global deployment of nuclear technology is maintaining transparency among nation-states and international communities. By providing an environment in which to exchange scientific and technological information regarding nuclear technology, the safe and legitimate use of nuclear material and technology can be assured. Many nations are considering closed or multiple-application nuclear fuel cycles and are subsequently developing advanced reactors in an effort to obtain some degree of energy self-sufficiency. Proliferation resistance features that prevent theft or diversion of nuclear material and reduce the likelihood of diversion from the civilian nuclear power fuel cycle are critical for a global nuclear future. IAEA Safeguards have been effective in minimizing opportunities for diversion; however, recent changes in the global political climate suggest implementation of additional technology and methods to ensure the prompt detection of proliferation. For a variety of reasons, nuclear facilities are becoming increasingly automated and will require minimum manual operation. This trend provides an opportunity to utilize the abundance of process information for monitoring proliferation risk, especially in future facilities. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to resist proliferation associated with these activities. Additionally, a framework designed to monitor processes will ensure the legitimate use of nuclear material. This report describes recent efforts to develop a methodology capable of assessing proliferation risk in support of overall plant transparency. The framework may be tested at the candidate site located in Japan: the Fuel Handling Training Model designed for the Monju Fast Reactor at the International Cooperation and Development Training Center of the Japan Atomic Energy Agency.

McClellan, Yvonne; York, David L.; Inoue, Naoko (Japan Atomic Energy Agency, Ibaraki, Japan); Love, Tracia L.; Rochau, Gary Eugene

2006-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

New generation nuclear fuel structures: dense particles in selectively soluble matrix  

SciTech Connect

We have developed a technology for dispersing sub-millimeter sized fuel particles within a bulk matrix that can be selectively dissolved. This may enable the generation of advanced nuclear fuels with easy separation of actinides and fission products. The large kinetic energy of the fission products results in most of them escaping from the sub-millimeter sized fuel particles and depositing in the matrix during burning of the fuel in the reactor. After the fuel is used and allowed to cool for a period of time, the matrix can be dissolved and the fission products removed for disposal while the fuel particles are collected by filtration for recycle. The success of such an approach would meet a major goal of the GNEP program to provide advanced recycle technology for nuclear energy production. The benefits of such an approach include (1) greatly reduced cost of the actinide/fission product separation process, (2) ease of recycle of the fuel particles, and (3) a radiation barrier to prevent theft or diversion of the recycled fuel particles during the time they are re-fabricated into new fuel. In this study we describe a method to make surrogate nuclear fuels of micrometer scale W (shell)/Mo (core) or HfO2 particles embedded in an MgO matrix that allows easy separation of the fission products and their embedded particles. In brief, the method consists of physically mixing W-Mo or hafnia particles with an MgO precursor. Heating the mixture, in air or argon, without agitation, to a temperature is required for complete decomposition of the precursor. The resulting material was examined using chemical analysis, scanning electron microscopy, X-ray diffraction and micro X-ray computed tomography and found to consist of evenly dispersed particles in an MgO + matrix. We believe this methodology can be extended to actinides and other matrix materials.

Sickafus, Kurt E [Los Alamos National Laboratory; Devlin, David J [Los Alamos National Laboratory; Jarvinen, Gordon D [Los Alamos National Laboratory; Patterson, Brian M [Los Alamos National Laboratory; Pattillo, Steve G [Los Alamos National Laboratory; Valdez, James [Los Alamos National Laboratory; Phillips, Jonathan [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

402

Technical solutions to nonproliferation challenges  

SciTech Connect

The threat of nuclear terrorism is real and poses a significant challenge to both U.S. and global security. For terrorists, the challenge is not so much the actual design of an improvised nuclear device (IND) but more the acquisition of the special nuclear material (SNM), either highly enriched uranium (HEU) or plutonium, to make the fission weapon. This paper provides two examples of technical solutions that were developed in support of the nonproliferation objective of reducing the opportunity for acquisition of HEU. The first example reviews technologies used to monitor centrifuge enrichment plants to determine if there is any diversion of uranium materials or misuse of facilities to produce undeclared product. The discussion begins with a brief overview of the basics of uranium processing and enrichment. The role of the International Atomic Energy Agency (IAEA), its safeguard objectives and how the technology evolved to meet those objectives will be described. The second example focuses on technologies developed and deployed to monitor the blend down of 500 metric tons of HEU from Russia's dismantled nuclear weapons to reactor fuel or low enriched uranium (LEU) under the U.S.-Russia HEU Purchase Agreement. This reactor fuel was then purchased by U.S. fuel fabricators and provided about half the fuel for the domestic power reactors. The Department of Energy established the HEU Transparency Program to provide confidence that weapons usable HEU was being blended down and thus removed from any potential theft scenario. Two measurement technologies, an enrichment meter and a flow monitor, were combined into an automated blend down monitoring system (BDMS) and were deployed to four sites in Russia to provide 24/7 monitoring of the blend down. Data was downloaded and analyzed periodically by inspectors to provide the assurances required.

Satkowiak, Lawrence [Director, Nonproliferation, Safeguards and Security Programs, Oak Ridge National Laboratory, Oak Ridge, Tennessee (United States)

2014-05-09T23:59:59.000Z

403

17 - Protecting Commercial and Institutional Critical Infrastructure  

Science Journals Connector (OSTI)

This chapter focuses on protecting commercial and institutional sectors, including retail businesses, banks and financial businesses, educational institutions (a subsector of government facilities), and healthcare and public health institutions. Each of these topics begins with a broad perspective from U.S. Department of Homeland Security Sector-Specific Plans. Keywords shrinkage, shopping service, checkout counters, point-of-sale (POS) accounting systems, exception reporting, counterfeiting, kleptomania, organized retail theft, electronic article surveillance, source tagging, civil recovery, robbery, burglary, substitutability, U.S. Department of the Treasury, Bank Protection Act (BPA) of 1968, savings and loan (S&L) scandal, Bank Secrecy Act of 1986, Anti-Drug Abuse Act of 1988, The Antiterrorism and Effective Death Penalty Act of 1996, Gramm-Leach-Bliley Act of 1999, USA Patriot Act of 2001, Sarbanes-Oxley (SOX) Act of 2002, Regulation H, Code of Federal Regulations, suspicious activity reports, money laundering, tear gas/dye packs, Global Positioning System (GPS), skimming, Gun-Free Schools Act, zero-tolerance policy, Family Educational Rights and Privacy Act, Gang Resistance Education and Training (GREAT), “soft” targets, Safe and Drug-Free Schools and Communities Act, “hard” targets, Columbine High School massacre, Beslan Elementary School massacre, Virginia Tech massacre, Student-Right-to-Know and Campus Security Act of 1990, Campus Sexual Assault Victims’ Bill of Rights, community policing, Emergency Medical Treatment and Active Labor Act, Health Insurance Portability and Accountability Act of 1996 (HIPAA), The Joint Commission, National Center for Missing and Exploited Children, Controlled Substances Act of 1970, first receivers, personal protective equipment (PPE), Public Health Security and Bioterrorism Preparedness and Response Act of 2002, Centers for Disease Control and Prevention (CDC)

Philip P. Purpura

2013-01-01T23:59:59.000Z

404

An optimized international vehicle monitor  

SciTech Connect

The security plans for many DOE facilities require the monitoring of pedestrians and vehicles to control the movement of special nuclear material (SNM). Vehicle monitors often provide the outer-most barrier against the theft of SNM. Automatic monitors determine the presence of SNM by comparing the gamma-ray and neutron intensity while occupied, to the continuously updated background radiation level which is measured while the unit is unoccupied. The most important factors in choosing automatic vehicle monitors are sensitivity, cost and in high traffic applications total monitoring time. The two types of automatic vehicle monitors presently in use are the vehicle monitoring station and the drive-through vehicle monitor. These two types have dramatically different cost and sensitivities. The vehicle monitoring station has a worst-case detection sensitivity of 40 g of highly enriched uranium, HEU, and a cost approximately $180k. This type of monitor is very difficult to install and can only be used in low traffic flow locations. The drive-through vehicle portal has a worst-case detection sensitivity of 1 kg of HEU and a cost approximately $20k. The world`s political situation has created a pressing need to prevent the diversion of SNM from FSU nuclear facilities and across international borders. Drive-through vehicle monitors would be an effective and practical nuclear material proliferation deterrent if their sensitivity can be improved to a sufficient level. The goal of this project is to evaluate different detector configurations as a means of improving the sensitivity of these instruments to achieve a vehicle monitor that is economical, practical to install, and has adequate sensitivity to be an effective barrier to illegal transportation of SNM.

York, R.L.; Close, D.A.; Fehlau, P.E.

1997-03-01T23:59:59.000Z

405

Security-by-design handbook.  

SciTech Connect

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

406

Nuclear materials control and accountability criteria for upgrades measures  

SciTech Connect

As a result of major political and societal changes in the past several years, methods of nuclear material control may no longer be as effective as in the past in Russia, the Newly Independent States (NIS), and the Baltic States (BS). The objective of the Department of Energy (DOE) Material Protection, Control, and Accounting Program (MPC and A) is to reduce the threat of nuclear proliferation by collaborating with Russia, NIS, and BS governments to promote western-style MPC and A. This cooperation will improve the MPC and A on all weapons useable nuclear materials and will establish a sustainable infrastructure to provide future support and maintenance for these technology-based improvements. Nuclear materials of proliferation concern include materials of the types and quantities that can be most easily and directly used in a nuclear weapon. Sabotage of nuclear material is an event of great concern and potentially disastrous consequences to both the US and the host country. However, sabotage is currently beyond the scope of program direction and cannot be used to justify US-funded MPC and A upgrades. Judicious MPC and A upgrades designed to protect against insider and outsider theft scenarios would also provide addition, although not comprehensive, protection against saboteurs. This paper provides some suggestions to establish consistency in prioritizing system-enhancement efforts at nuclear material facilities. The suggestions in this paper are consistent with DOE policy and directions and should be used as a supplement to any policy directives issued by NN-40, DOE Russia/NIS Task Force.

Erkkila, B.H.; Hatcher, C.R.

1998-11-01T23:59:59.000Z

407

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

408

FOSTERING MULTI-LATERAL COOPERATION BETWEEN THE GOVERNMENTS OF MEXICO, COLOMBIA, AND THE UNITED STATES TO ENHANCE THE PROTECTION OF HIGH-ACTIVITY RADIOACTIVE SOURCES  

SciTech Connect

The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Mexico, GTRI first made contact in 2005. The project then lost momentum and stalled. At the same time, GTRI’s cooperation with the Republic of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Mexico and to facilitate this cooperation, they offered to invite their Mexican counterparts to Colombia to observe its successful cooperation with GTRI. Shortly after that visit, the Government of Mexico agreed to move forward and requested that the cooperative efforts in Mexico be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians. As a result, 22 of Mexico’s largest radioactive sites have had security upgrades in place within 18 months of cooperation.

Butler, Nicholas; Watson, Erica E.; Wright, Kyle A.

2009-10-07T23:59:59.000Z

409

Solar energy trial in Folovhodwe South Africa: Lessons for policy and decision-makers  

Science Journals Connector (OSTI)

In Mutale Local Authority of South Africa, a photovoltaic pilot project was commissioned to provide off-grid electricity to 582 households residing in Folovhodwe village. The aim was to try a renewable source of energy supply in a rural settlement area. The Beneficiaries Assessment method was used to assess the problems of the implementation and operation of the solar energy project in Folovhodwe. The project initiators did not realize that there would be the problem of the sustainable implementation of the project. The problem of sustainability was related to the inadequate definition of the role of each stakeholder. For example the end users were not taught how to properly operate and repair faulty equipment because it was not built into the planning and implementation stages of the project. Skill acquisition through capacity building for the end users can promote the sustainability of the project on a long-term basis. In Folovhodwe, improper planning and implementation of the project was responsible for the failure of the project. The project initiators did not foresee the problem of theft of materials, problems related to the procurement of spare parts and who would bear the cost of maintenance of the facilities. The failure of the project was also related to the inability of the policy makers to tackle the question of the role that each stakeholder should play to ensure the success of the project in a rural setting. The suggestion to policy and decision-makers is that pilot projects with relatively new technology input in a rural area should reconsider the importance of culture, capacity development and the level of income of the end users at the initial planning stage and implementation.

P. Bikam; D.J. Mulaudzi

2006-01-01T23:59:59.000Z

410

Report by a special panel of the American Nuclear Society: Protection and management of plutonium  

SciTech Connect

The American Nuclear Society (ANS) established an independent and prestigious panel several months ago to take the matter up where the US National Academy of Science (NAS) left off. The challenge was to look at the broader issue of what to do with civil plutonium, as well as excess weapons material. In terms of approach, the report focused on several short- and long-term issues. The short-term focus was on the disposition of excess weapons plutonium, while the longer-range issue concerned the disposition of the plutonium being produced in the civil nuclear fuel cycle. For the short term, the ANS panel strongly endorsed the concept that all plutonium scheduled for release from the US and Russian weapons stocks should be converted to a form that is intensively radioactive in order to protect the plutonium from theft of seizure (the spent fuel standard). However, since the conversion will at best take several years to complete, the panel has concluded that immediate emphasis should be placed on the assurance that all unconverted materials are protected as securely as when they were part of the active weapon stockpiles. More importantly, the panel also recommended prompt implementation of the so-called reactor option for disposing of surplus US and Russian weapons plutonium. The longer-term issues covered by the panel were those posed by the growing stocks of both separated plutonium and spent fuel generated in the world`s civil nuclear power programs. These issues included what fuel cycle policies should be prudently pursued in light of proliferation risks and likely future energy needs, what steps should be taken in regard to the increase in the demand for nuclear power in the future, and how civil plutonium in its various forms should be protected and managed to minimize proliferation. Overall, the panel concluded that plutonium is an energy resource that should be used and not a waste material to be disposed of.

Bengelsdorf, H. [Bengelsdorf (Harold), Bethesda, MD (United States)

1996-07-01T23:59:59.000Z

411

Performance Demonstration Program Plan for Nondestructive Assay of Drummed Wastes for the TRU Waste Characterization Program  

SciTech Connect

The Performance Demonstration Program (PDP) for nondestructive assay (NDA) consists of a series of tests to evaluate the capability for NDA of transuranic (TRU) waste throughout the Department of Energy (DOE) complex. Each test is termed a PDP cycle. These evaluation cycles provide an objective measure of the reliability of measurements obtained from NDA systems used to characterize the radiological constituents of TRU waste. The primary documents governing the conduct of the PDP are the Waste Acceptance Criteria for the Waste Isolation Pilot Plant (WAC; DOE 1999a) and the Quality Assurance Program Document (QAPD; DOE 1999b). The WAC requires participation in the PDP; the PDP must comply with the QAPD and the WAC. The WAC contains technical and quality requirements for acceptable NDA. This plan implements the general requirements of the QAPD and applicable requirements of the WAC for the NDA PDP. Measurement facilities demonstrate acceptable performance by the successful testing of simulated waste containers according to the criteria set by this PDP Plan. Comparison among DOE measurement groups and commercial assay services is achieved by comparing the results of measurements on similar simulated waste containers reported by the different measurement facilities. These tests are used as an independent means to assess the performance of measurement groups regarding compliance with established quality assurance objectives (QAO's). Measurement facilities must analyze the simulated waste containers using the same procedures used for normal waste characterization activities. For the drummed waste PDP, a simulated waste container consists of a 55-gallon matrix drum emplaced with radioactive standards and fabricated matrix inserts. These PDP sample components are distributed to the participating measurement facilities that have been designated and authorized by the Carlsbad Field Office (CBFO). The NDA Drum PDP materials are stored at these sites under secure conditions to protect them from loss, tampering, or accidental damage. Using removable PDP radioactive standards, isotopic activities in the simulated waste containers are varied to the extent possible over the range of concentrations anticipated in actual waste characterization situations. Manufactured matrices simulate expected waste matrix conditions and provide acceptable consistency in the sample preparation process at each measurement facility. Analyses that are required by the Waste Isolation Pilot Plant (WIPP) to demonstrate compliance with various regulatory requirements and that are included in the PDP may only be performed by measurement facilities that demonstrate acceptable performance in the PDP. These analyses are referred to as WIPP analyses, and the wastes on which they are performed are referred to as WIPP wastes in this document.

DOE Carlsbad Field Office

2001-04-06T23:59:59.000Z

412

The development and application of the Remotely Monitored Sealing Array (RMSA).  

SciTech Connect

Advanced sealing technologies are often an integral part of a containment surveillance (CS) approach to detect undeclared diversion of nuclear materials. As adversarial capabilities continue to advance, the sophistication of the seal design must advance as well. The intelligent integration of security concepts into a physical technology used to seal monitored items is a fundamental requirement for secure containment. Seals have a broad range of capabilities. These capabilities must be matched appropriately to the application to establish the greatest effectiveness from the seal. However, many current seal designs and their application fail to provide the high confidence of detection and timely notification that can be appreciated with new technology. Additionally, as monitoring needs rapidly expand, out-pacing budgets, remote monitoring of low-cost autonomous sealing technologies becomes increasingly appealing. The Remotely Monitored Sealing Array (RMSA) utilizes this technology and has implemented cost effective security concepts establishing the high confidence that is expected of active sealing technology today. RMSA is a system of relatively low-cost but secure active loop seals for the monitoring of nuclear material containers. The sealing mechanism is a fiber optic loop that is pulsed using a low-power LED circuit with a coded signal to verify integrity. Battery life is conserved by the use of sophisticated power management techniques, permitting many years of reliable operation without battery replacement or other maintenance. Individual seals communicate by radio using a secure transmission protocol using either of two specially designated communication frequency bands. Signals are encrypted and authenticated by private key, established during the installation procedure, and the seal bodies feature both active and passive tamper indication. Seals broadcast to a central 'translator' from which information is both stored locally and/or transmitted remotely for review. The system is especially appropriate for nuclear material storage facilities, indoor or outdoor, enabling remote inspection of status rather than tedious individual seal verification, and without the need for interconnected cabling. A handheld seal verifier is also available for an inspector to verify any particular individual seal in close proximity. This paper will discuss the development of the RMSA sealing system, its capabilities, its application philosophy, and projected future trends.

Schoeneman, Barry Dale; Stein, Marius (Canberra, USA); Wishard, B. (International Atomic Energy Agency, Austria)

2010-09-01T23:59:59.000Z

413

NEUTRON MULTIPLICITY AND ACTIVE WELL NEUTRON COINCIDENCE VERIFICATION MEASUREMENTS PERFORMED FOR MARCH 2009 SEMI-ANNUAL DOE INVENTORY  

SciTech Connect

The Analytical Development (AD) Section field nuclear measurement group performed six 'best available technique' verification measurements to satisfy a DOE requirement instituted for the March 2009 semi-annual inventory. The requirement of (1) yielded the need for SRNL Research Operations Department Material Control & Accountability (MC&A) group to measure the Pu content of five items and the highly enrich uranium (HEU) content of two. No 14Q-qualified measurement equipment was available to satisfy the requirement. The AD field nuclear group has routinely performed the required Confirmatory Measurements for the semi-annual inventories for fifteen years using sodium iodide and high purity germanium (HpGe) {gamma}-ray pulse height analysis nondestructive assay (NDA) instruments. With appropriate {gamma}-ray acquisition modeling, the HpGe spectrometers can be used to perform verification-type quantitative assay for Pu-isotopics and HEU content. The AD nuclear NDA group is widely experienced with this type of measurement and reports content for these species in requested process control, MC&A booking, and holdup measurements assays Site-wide. However none of the AD HpGe {gamma}-ray spectrometers have been 14Q-qualified, and the requirement of reference 1 specifically excluded a {gamma}-ray PHA measurement from those it would accept for the required verification measurements. The requirement of reference 1 was a new requirement for which the Savannah River National Laboratory (SRNL) Research Operations Department (ROD) MC&A group was unprepared. The criteria for exemption from verification were: (1) isotope content below 50 grams; (2) intrinsically tamper indicating or TID sealed items which contain a Category IV quantity of material; (3) assembled components; and (4) laboratory samples. Therefore all (SRNL) Material Balance Area (MBA) items with greater than 50 grams total Pu or greater than 50 grams HEU were subject to a verification measurement. The pass/fail criteria of reference 7 stated 'The facility will report measured values, book values, and statistical control limits for the selected items to DOE SR...', and 'The site/facility operator must develop, document, and maintain measurement methods for all nuclear material on inventory'. These new requirements exceeded SRNL's experience with prior semi-annual inventory expectations, but allowed the AD nuclear field measurement group to demonstrate its excellent adaptability and superior flexibility to respond to unpredicted expectations from the DOE customer. The requirements yielded five SRNL items subject to Pu verification and two SRNL items subject to HEU verification. These items are listed and described in Table 1.

Dewberry, R.; Ayers, J.; Tietze, F.; Klapper, K.

2010-02-05T23:59:59.000Z

414

ENVIRONMENTAL SAMPLING USING LOCATION SPECIFIC AIR MONITORING IN BULK HANDLING FACILITIES  

SciTech Connect

Since the introduction of safeguards strengthening measures approved by the International Atomic Energy Agency (IAEA) Board of Governors (1992-1997), international nuclear safeguards inspectors have been able to utilize environmental sampling (ES) (e.g. deposited particulates, air, water, vegetation, sediments, soil and biota) in their safeguarding approaches at bulk uranium/plutonium handling facilities. Enhancements of environmental sampling techniques used by the IAEA in drawing conclusions concerning the absence of undeclared nuclear materials or activities will soon be able to take advantage of a recent step change improvement in the gathering and analysis of air samples at these facilities. Location specific air monitoring feasibility tests have been performed with excellent results in determining attribute and isotopic composition of chemical elements present in an actual test-bed sample. Isotopic analysis of collected particles from an Aerosol Contaminant Extractor (ACE) collection, was performed with the standard bulk sampling protocol used throughout the IAEA network of analytical laboratories (NWAL). The results yielded bulk isotopic values expected for the operations. Advanced designs of air monitoring instruments such as the ACE may be used in gas centrifuge enrichment plants (GCEP) to detect the production of highly enriched uranium (HEU) or enrichments not declared by a State. Researchers at Savannah River National Laboratory in collaboration with Oak Ridge National Laboratory are developing the next generation of ES equipment for air grab and constant samples that could become an important addition to the international nuclear safeguards inspector's toolkit. Location specific air monitoring to be used to establish a baseline environmental signature of a particular facility employed for comparison of consistencies in declared operations will be described in this paper. Implementation of air monitoring will be contrasted against the use of smear ES when used during unannounced inspections, design information verification, limited frequency unannounced access, and complementary access visits at bulk handling facilities. Analysis of technical features required for tamper indication and resistance will demonstrate the viability of successful application of the system in taking ES within a bulk handling location. Further exploration of putting this technology into practice is planned to include mapping uranium enrichment facilities for the identification of optimal for installation of air monitoring devices.

Sexton, L.; Hanks, D.; Degange, J.; Brant, H.; Hall, G.; Cable-Dunlap, P.; Anderson, B.

2011-06-07T23:59:59.000Z

415

Termination of Safeguards on ULWBR Material  

SciTech Connect

The Department of Energy (DOE), Office of Environmental Management, has approved the disposition of 31 metric tons of Unirradiated Light Water Breeder Reactor (ULWBR) material in canisters stored within dry wells of the Underground Fuel Storage Facility at the Idaho Nuclear Technology and Engineering Center (INTEC). This unirradiated material consists primarily of ceramic pellets of thorium oxide in stainless steel cladding, but it also contains 300 kilograms of uranium that is 98 wt% U-233. The ULWBR material was not processed at the INTEC because it was incompatible with prior chemical separation schemes. Other economical recovery options have not been identified, and expressions of interest for consolidating the material with existing projects at other DOE sites have not been received. The U-233 could be used for producing the medical isotope Actinium-225, but the proof-of-principle demonstration and follow-on pilot program have not been developed to the point of requiring production quantities of U-233. Consequently, the selected disposition of the ULWBR material was burial as Low Level Waste at the Nevada Test Site (NTS), which required terminating safeguards controls for the contained Category II quantity of Attractiveness Level D special nuclear material (SNM). The requested termination followed the twelve point evaluation criteria of the Historical Defense Program Discard Guidance and included a security analysis for evaluating the risks of theft, diversion, and radiological sabotage associated with the material. Continuity of knowledge in the book inventory was assured by documenting that the original shipper’s measurements accurately reflected the quantities of materials received and that the ULWBR materials had remained under adequate physical protection and had been subject to periodic physical inventories. The method selected for substantiating the book values as the basis for terminating safeguards was the nondestructive assay used during physical inventories. Shipping arrangements included refurbishing a licensed cask to be reused over the duration of the termination process. An accompanying batching plan and shipping schedule were developed to accommodate multiple commercial shipments of Category III quantities of SNM in the selected cask, such that all canisters would be received at NTS prior to the expiration of the nonrenewable cask license.

Ivan R. Thomas; Ernest L. Laible

2008-07-01T23:59:59.000Z

416

Material Control and Accounting Design Considerations for High-Temperature Gas Reactors  

SciTech Connect

The subject of this report is domestic safeguards and security by design (2SBD) for high-temperature gas reactors, focusing on material control and accountability (MC&A). The motivation for the report is to provide 2SBD support to the Next Generation Nuclear Plant (NGNP) project, which was launched by Congress in 2005. This introductory section will provide some background on the NGNP project and an overview of the 2SBD concept. The remaining chapters focus specifically on design aspects of the candidate high-temperature gas reactors (HTGRs) relevant to MC&A, Nuclear Regulatory Commission (NRC) requirements, and proposed MC&A approaches for the two major HTGR reactor types: pebble bed and prismatic. Of the prismatic type, two candidates are under consideration: (1) GA's GT-MHR (Gas Turbine-Modular Helium Reactor), and (2) the Modular High-Temperature Reactor (M-HTR), a derivative of Areva's Antares reactor. The future of the pebble-bed modular reactor (PBMR) for NGNP is uncertain, as the PBMR consortium partners (Westinghouse, PBMR [Pty] and The Shaw Group) were unable to agree on the path forward for NGNP during 2010. However, during the technology assessment of the conceptual design phase (Phase 1) of the NGNP project, AREVA provided design information and technology assessment of their pebble bed fueled plant design called the HTR-Module concept. AREVA does not intend to pursue this design for NGNP, preferring instead a modular reactor based on the prismatic Antares concept. Since MC&A relevant design information is available for both pebble concepts, the pebble-bed HTGRs considered in this report are: (1) Westinghouse PBMR; and (2) AREVA HTR-Module. The DOE Office of Nuclear Energy (DOE-NE) sponsors the Fuel Cycle Research and Development program (FCR&D), which contains an element specifically focused on the domestic (or state) aspects of SBD. This Material Protection, Control and Accountancy Technology (MPACT) program supports the present work summarized in this report, namely the development of guidance to support the consideration of MC&A in the design of both pebble-bed and prismatic-fueled HTGRs. The objective is to identify and incorporate design features into the facility design that will cost effectively aid in making MC&A more effective and efficient, with minimum impact on operations. The theft of nuclear material is addressed through both MC&A and physical protection, while the threat of sabotage is addressed principally through physical protection.

Trond Bjornard; John Hockert

2011-08-01T23:59:59.000Z

417

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

418

FOSTERING MULTI-LATERAL COOPERATION BETWEEN THE GOVERNMENTS OF DOMINICAN REPUBLIC, COLOMBIA, AND THE UNITED STATES TO ENHANCE THE PROTECTION OF HIGH-ACTIVITY RADIOACTIVE SOURCES  

SciTech Connect

The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Dominican Republic, the GTRI first received contact in 2008 from the Government of Dominican Republic. They requested cooperation that was similar to the tri-partite cooperation between Colombia, Mexico and the United States. Throughout the region it was widely known that the GTRI’s cooperation with the Government of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The Government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. In 2007, Colombia was an integral component of GTRI multi-lateral cooperation initiation in Mexico. As a result, twenty two of Mexico’s largest radioactive sites have been upgraded in the past eighteen months. These two endeavors served as catalysts for cooperation opportunities in the Dominican Republic. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Dominican Republic and to facilitate this cooperation, they traveled to the Dominican Republic and provided briefings and presentations which demonstrated its successful cooperation with the GTRI. Shortly after that visit, the Government of Dominican Republic agreed to move forward and requested that the cooperative efforts in Dominican Republic be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians, and the financial and technical support of the United States. As a result, two of Dominican Republic’s largest radioactive sites had security upgrades in place within 90 days of the cooperation visit in December 2008.

Butler, Nicholas; McCaw, Erica E.; Wright, Kyle A.; Medina, Maximo

2009-10-06T23:59:59.000Z

419

Clean Cities Guide to Alternative Fuel Commercial Lawn Equipment (Brochure)  

SciTech Connect

Guide explains the different types of alternative fuel commercial mowers and lists the makes and models of the ones available on the market. Turf grass is a fixture of the American landscape and the American economy. It is the nation's largest irrigated crop, covering more than 40 million acres. Legions of lawnmowers care for this expanse during the growing season-up to year-round in the warmest climates. The annual economic impact of the U.S. turf grass industry has been estimated at more than $62 billion. Lawn mowing also contributes to the nation's petroleum consumption and pollutant emissions. Mowers consume 1.2 billion gallons of gasoline annually, about 1% of U.S. motor gasoline consumption. Commercial mowing accounts for about 35% of this total and is the highest-intensity use. Large property owners and mowing companies cut lawns, sports fields, golf courses, parks, roadsides, and other grassy areas for 7 hours per day and consume 900 to 2,000 gallons of fuel annually depending on climate and length of the growing season. In addition to gasoline, commercial mowing consumes more than 100 million gallons of diesel annually. Alternative fuel mowers are one way to reduce the energy and environmental impacts of commercial lawn mowing. They can reduce petroleum use and emissions compared with gasoline- and diesel-fueled mowers. They may also save on fuel and maintenance costs, extend mower life, reduce fuel spillage and fuel theft, and promote a 'green' image. And on ozone alert days, alternative fuel mowers may not be subject to the operational restrictions that gasoline mowers must abide by. To help inform the commercial mowing industry about product options and potential benefits, Clean Cities produced this guide to alternative fuel commercial lawn equipment. Although the guide's focus is on original equipment manufacturer (OEM) mowers, some mowers can be converted to run on alternative fuels. For more information about propane conversions. This guide may be particularly helpful for organizations that are already using alternative fuels in their vehicles and have an alternative fuel supply or electric charging in place (e.g., golf cart charging stations at most golf courses). On the flip side, experiencing the benefits of using alternative fuels in mowing equipment may encourage organizations to try them in on-road vehicles as well. Whatever the case, alternative fuel commercial lawnmowers are a powerful and cost-effective way to reduce U.S. petroleum dependence and help protect the environment.

Not Available

2011-10-01T23:59:59.000Z

420

Illicit trafficking of radiological & nuclear materials : modeling and analysis of trafficking trends and risks.  

SciTech Connect

Concerns over the illicit trafficking of radiological and nuclear materials were focused originally on the lack of security and accountability of such material throughout the former Soviet states. This is primarily attributed to the frequency of events that have occurred involving the theft and trafficking of critical material components that could be used to construct a Radiological Dispersal Device (RDD) or even a rudimentary nuclear device. However, with the continued expansion of nuclear technology and the deployment of a global nuclear fuel cycle these materials have become increasingly prevalent, affording a more diverse inventory of dangerous materials and dual-use items. To further complicate the matter, the list of nuclear consumers has grown to include: (1) Nation-states that have gone beyond the IAEA agreed framework and additional protocols concerning multiple nuclear fuel cycles and processes that reuse the fuel through reprocessing to exploit technologies previously confined to the more industrialized world; (2) Terrorist organizations seeking to acquire nuclear and radiological material due to the potential devastation and psychological effect of their use; (3) Organized crime, which has discovered a lucrative market in trafficking of illicit material to international actors and/or countries; and (4) Amateur smugglers trying to feed their families in a post-Soviet era. An initial look at trafficking trends of this type seems scattered and erratic, localized primarily to a select group of countries. This is not necessarily the case. The success with which other contraband has been smuggled throughout the world suggests that nuclear trafficking may be carried out with relative ease along the same routes by the same criminals or criminal organizations. Because of the inordinately high threat posed by terrorist or extremist groups acquiring the ingredients for unconventional weapons, it is necessary that illicit trafficking of these materials be better understood as to prepare for the sustained global development of the nuclear fuel cycle. Conversely, modeling and analyses of this activity must not be limited in their scope to loosely organized criminal smuggling, but address the problem as a commercial, industrial project for the covert development of nuclear technologies and unconventional weapon development.

York, David L.; Love, Tracia L.; Rochau, Gary Eugene

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "tampering theft vandalism" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

RESULTS FROM A DEMONSTRATION OF RF-BASED UF6 CYLINDER ACCOUNTING AND TRACKING SYSTEM INSTALLED AT A USEC FACILITY  

SciTech Connect

Approved industry-standard cylinders are used globally for storing and transporting uranium hexafluoride (UF{sub 6}) at uranium enrichment plants and processing facilities. To verify that no diversion or undeclared production of nuclear material involving UF{sub 6} cylinders at the facility has occurred, the International Atomic Energy Agency (IAEA) conducts periodic, labor-intensive physical inspections to validate facility records, cylinder identities, and cylinder weights. A reliable cylinder monitoring system that would improve overall inspector effectiveness would be a significant improvement to the current international safeguards inspection regime. Such a system could include real-time unattended monitoring of cylinder movements, situation-specific rules-based event detection algorithms, and the capability to integrate with other types of safeguards technologies. This type of system could provide timely detection of abnormal operational activities that may be used to ensure more appropriate and efficient responses by the IAEA. A system of this type can reduce the reliance on paper records and have the additional benefit of facilitating domestic safeguards at the facilities at which it is installed. A radio-frequency (RF)-based system designed to track uranium hexafluoride (UF{sub 6}) cylinders during processing operations was designed, assembled, and tested at the United States Enrichment Corporation (USEC) facility in Portsmouth, Ohio, to determine the operational feasibility and durability of RF technology. The overall objective of the effort was to validate the robustness of RF technology for potential use as a future international safeguards tool for tracking UF6 cylinders at uranium-processing facilities. The results to date indicate that RF tags represent a feasible technique for tracking UF{sub 6} cylinders in operating facilities. Additional work will be needed to improve the operational robustness of the tags for repeated autoclave processing and to add tamper-indicating and data authentication features to some of the pertinent system components. Future efforts will focus on these needs along with implementing protocols relevant to IAEA safeguards. The work detailed in this report demonstrates the feasibility of constructing RF devices that can survive the operational rigors associated with the transportation, storage, and processing of UF6 cylinders. The system software specially designed for this project is called Cylinder Accounting and Tracking System (CATS). This report details the elements of the CATS rules-based architecture and its use in safeguards-monitoring and asset-tracking applications. Information is also provided on improvements needed to make the technology ready, as well as options for improving the safeguards aspects of the technology. The report also includes feedback from personnel involved in the testing, as well as individuals who could utilize an RF-based system in supporting the performance of their work. The system software was set up to support a Mailbox declaration, where a declaration can be made either before or after cylinder movements take place. When the declaration is made before cylinders move, the operators must enter this information into CATS. If the IAEA then shows up unexpectedly at the facility, they can see how closely the operational condition matches the declaration. If the declaration is made after the cylinders move, this provides greater operational flexibility when schedules are interrupted or are changed, by allowing operators to declare what moves have been completed. The IAEA can then compare where cylinders are with where CATS or the system says they are located. The ability of CATS to automatically generate Mailbox declarations is seen by the authors as a desirable feature. The Mailbox approach is accepted by the IAEA but has not been widely implemented (and never in enrichment facilities). During the course of this project, we have incorporated alternative methods for implementation.

Pickett, Chris A [ORNL; Kovacic, Donald N [ORNL; Morgan, Jim [Innovative Solutions; Younkin, James R [ORNL; Carrick, Bernie [USEC; Ken, Whittle [USEC; Johns, R E [Pacific Northwest National Laboratory (PNNL)

2008-09-01T23:59:59.000Z

422

Performance Demonstration Program Plan for Nondestructive Assay of Boxed Wastes for the TRU Waste Characterization Program  

SciTech Connect

The Performance Demonstration Program (PDP) for nondestructive assay (NDA) consists of a series of tests to evaluate the capability for NDA of transuranic (TRU) waste throughout the Department of Energy (DOE) complex. Each test is termed a PDP cycle. These evaluation cycles provide an objective measure of the reliability of measurements obtained from NDA systems used to characterize the radiological constituents of TRU waste. The primary documents governing the conduct of the PDP are the Waste Acceptance Criteria for the Waste Isolation Pilot Plant (WAC; DOE 1999a) and the Quality Assurance Program Document (QAPD; DOE 1999b). The WAC requires participation in the PDP; the PDP must comply with the QAPD and the WAC. The WAC contains technical and quality requirements for acceptable NDA. This plan implements the general requirements of the QAPD and applicable requirements of the WAC for the NDA PDP for boxed waste assay systems. Measurement facilities demonstrate acceptable performance by the successful testing of simulated waste containers according to the criteria set by this PDP Plan. Comparison among DOE measurement groups and commercial assay services is achieved by comparing the results of measurements on similar simulated waste containers reported by the different measurement facilities. These tests are used as an independent means to assess the performance of measurement groups regarding compliance with established quality assurance objectives (QAO’s). Measurement facilities must analyze the simulated waste containers using the same procedures used for normal waste characterization activities. For the boxed waste PDP, a simulated waste container consists of a modified standard waste box (SWB) emplaced with radioactive standards and fabricated matrix inserts. An SWB is a waste box with ends designed specifically to fit the TRUPACT-II shipping container. SWB’s will be used to package a substantial volume of the TRU waste for disposal. These PDP sample components are distributed to the participating measurement facilities that have been designated and authorized by the Carlsbad Field Office (CBFO). The NDA Box PDP materials are stored at these sites under secure conditions to protect them from loss, tampering, or accidental damage. Using removable PDP radioactive standards, isotopic activities in the simulated waste containers are varied to the extent possible over the range of concentrations anticipated in actual waste characterization situations. Manufactured matrices simulate expected waste matrix configurations and provide acceptable consistency in the sample preparation process at each measurement facility. Analyses that are required by the Waste Isolation Pilot Plant (WIPP) to demonstrate compliance with various regulatory requirements and that are included in the PDP may only be performed by measurement facilities that demonstrate acceptable performance in the PDP. These analyses are referred to as WIPP analyses, and the wastes on which they are performed are referred to as WIPP wastes in this document.

Carlsbad Field Office

2001-01-31T23:59:59.000Z

423

U.S. and Russian Collaboration in the Area of Nuclear Forensics  

SciTech Connect

Nuclear forensics has become increasingly important in the fight against illicit trafficking in nuclear and other radioactive materials. The illicit trafficking of nuclear materials is, of course, an international problem; nuclear materials may be mined and milled in one country, manufactured in a second country, diverted at a third location, and detected at a fourth. There have been a number of articles in public policy journals in the past year that call for greater interaction between the U. S. and the rest of the world on the topic of nuclear forensics. Some believe that such international cooperation would help provide a more certain capability to identify the source of the nuclear material used in a terrorist event. An improved international nuclear forensics capability would also be important as part of the IAEA verification toolkit, particularly linked to increased access provided by the additional protocol. A recent study has found that, although international progress has been made in securing weapons-usable HEU and Pu, the effort is still insufficient. They found that nuclear material, located in 40 countries, could be obtained by terrorists and criminals and used for a crude nuclear weapon. Through 2006, the IAEA Illicit Trafficking Database had recorded a total of 607 confirmed events involving illegal possession, theft, or loss of nuclear and other radioactive materials. Although it is difficult to predict the future course of such illicit trafficking, increasingly such activities are viewed as significant threats that merit the development of special capabilities. As early as April, 1996, nuclear forensics was recognized at the G-8 Summit in Moscow as an important element of an illicit nuclear trafficking program. Given international events over the past several years, the value and need for nuclear forensics seems greater than ever. Determining how and where legitimate control of nuclear material was lost and tracing the route of the material from diversion through interdiction are important goals for nuclear forensics and attribution. It is equally important to determine whether additional devices or materials that pose a threat to public safety are also available. Finding the answer to these questions depends on determining the source of the material and its method of production. Nuclear forensics analysis and interpretation provide essential insights into methods of production and sources of illicit radioactive materials. However, they are most powerful when combined with other sources of information, including intelligence and traditional detective work. The certainty of detection and punishment for those who remove nuclear materials from legitimate control provides the ultimate deterrent for such diversion and, ultimately, for the intended goal of such diversion, including nuclear terrorism or proliferation. Consequently, nuclear forensics is an integral part of 'nuclear deterrence' in the 21st century. Nuclear forensics will always be limited by the diagnostic information inherent in the interdicted material. Important markers for traditional forensics (fingerprints, stray material, etc.) can be eliminated or obscured, but many nuclear materials have inherent isotopic or chemical characteristics that serve as unequivocal markers of specific sources, production processes, or transit routes. The information needed for nuclear forensics goes beyond that collected for most commercial and international verification activities. Fortunately, the international nuclear engineering enterprise has a restricted number of conspicuous process steps that makes the interpretation process easier. Ultimately, though, it will always be difficult to distinguish between materials that reflect similar source or production histories, but are derived from disparate sites. Due to the significant capital costs of the equipment and the specialized expertise of the personnel, work in the field of nuclear forensics has been restricted so far to a handful of national and international laboratories. There are a limited number of

Kristo, M J

2007-10-22T23:59:59.000Z

424

Development and Demonstration of a Security Core Component  

SciTech Connect

In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

Turke, Andy

2014-02-28T23:59:59.000Z

425

CD-ROM REVIEWS SPECIALMultimedia CD-ROMs: what do they offer to enhance physics teaching?Some ideas for using CDs in the laboratoryPhysics at Work Volume 1Particle Physics,  

Science Journals Connector (OSTI)

Contents: CD-ROM REVIEWS SPECIAL: Multimedia CD-ROMs: what do they offer to enhance physics teaching? Some ideas for using CDs in the laboratory Physics at Work Volume 1 Particle Physics, a keyhole to the birth of Time RedShift 4 Build Your Own Time Machine Electricity and Magnetism Crocodile Clips: Physics Astronomy - the Earth and beyond Forces and Materials Cosmic Cabaret Multimedia Diffraction Waves and Vibrations Star Power Six Lost Scientists - Science World About the reviewers Other CDs recently reviewed in Physics Education WEB WATCH: Medical imaging BOOK REVIEW: Understanding Science Lessons CD-ROM REVIEWS SPECIALMultimedia CD-ROMs: what do they offer to enhance physics teaching? CD-ROMs face an uncertain, even unlikely, future. Nothing exists on CD that can't be downloaded from the internet, and with faster, bigger and more reliable data transfer and storage getting cheaper all the time, the days of the CD-ROM in the lab and classroom are numbered. Few educational software houses are developing new CD-ROMs - the big drive is to sell access to private learning zones on the web, such as Anglia Campus, the largest UK company in this field. So, why review CD-ROMs? CDs are simply the current storage medium of preference, but the teaching ideas, methods and materials are transferable: many are being imported onto the web. And, in 2001, CDs still work faster and with more detailed material that anything live from the web. The technology is moving quickly, but we won't be throwing away today's technology this year! CDs are nowadays cheap and easy to produce, allowing rapid updating of information into a handy, tamper-proof package. The course-team for the Open University's The Physical World physics course plan to update the course CDs annually, although the texts are printed and cannot be changed for the next five years. CDs are no longer the province of big publishers - Build Your Own Time Machine was produced by a small team at the University of the West of England. (This doubtless means that there must be lots of good CDs of which Physics Education is ignorant - if you have one to recommend, please contact the Editor.) Some textbooks and teaching resources also include CDs, often worksheets and extension questions. 'Multimedia' is a much over-used term. With no strict definition, 'multimedia' covers just about anything involving more than one way of conveying information. ('All my lessons are multimedia - I talk and write on the board'!) Generally multimedia CDs offer sound, images and moving images and are interactive, meaning that you can press a key or use a mouse to affect what you see and hear. They are a powerful teaching resource. I have seen good CDs which can inspire and teach two-year-olds and others that are great at university level. So what do they really do? I propose to classify the CDs I have seen into five broad categories: Virtual teachers These CDs 'teach' physics. There is writing, possibly with a voice commentary, explaining the topic, some photos or videos and diagrams, sometimes animated, to illustrate the teaching. The virtual teachers employ a variety of ways to keep their students motivated and involved - regular quizzes, progress sheets, interactive diagrams and other choices may keep the student on task. The Anglia Multimedia CDs are one of the widest ranges. Possibly the best-selling CDs are revision guides. Some of these, such as the Oxford revison guides, offer, in addition to the above, the facility to draw up a revision timetable, tailored to the student's own course specification. Databases and books This class of CDs make no pretence of trying to play teacher. Instead they offer information and resources. These could be catalogues of stars, masses of nuclides, video clips of experiments, poems about physics ... . The Advancing Physics CD, with its mountain of useful stuff for teachers, and encyclopaedias such as Encarta fall into this category. Virtual experiments Not to be confused with videos of real experiments, remotely controlled real experiments and software to enable you to

426

Data Analysis  

SciTech Connect

Analysis of the material protection, control, and accountability (MPC&A) system is necessary to understand the limits and vulnerabilities of the system to internal threats. A self-appraisal helps the facility be prepared to respond to internal threats and reduce the risk of theft or diversion of nuclear material. The material control and accountability (MC&A) system effectiveness tool (MSET) fault tree was developed to depict the failure of the MPC&A system as a result of poor practices and random failures in the MC&A system. It can also be employed as a basis for assessing deliberate threats against a facility. MSET uses fault tree analysis, which is a top-down approach to examining system failure. The analysis starts with identifying a potential undesirable event called a 'top event' and then determining the ways it can occur (e.g., 'Fail To Maintain Nuclear Materials Under The Purview Of The MC&A System'). The analysis proceeds by determining how the top event can be caused by individual or combined lower level faults or failures. These faults, which are the causes of the top event, are 'connected' through logic gates. The MSET model uses AND-gates and OR-gates and propagates the effect of event failure using Boolean algebra. To enable the fault tree analysis calculations, the basic events in the fault tree are populated with probability risk values derived by conversion of questionnaire data to numeric values. The basic events are treated as independent variables. This assumption affects the Boolean algebraic calculations used to calculate results. All the necessary calculations are built into the fault tree codes, but it is often useful to estimate the probabilities manually as a check on code functioning. The probability of failure of a given basic event is the probability that the basic event primary question fails to meet the performance metric for that question. The failure probability is related to how well the facility performs the task identified in that basic event over time (not just one performance or exercise). Fault tree calculations provide a failure probability for the top event in the fault tree. The basic fault tree calculations establish a baseline relative risk value for the system. This probability depicts relative risk, not absolute risk. Subsequent calculations are made to evaluate the change in relative risk that would occur if system performance is improved or degraded. During the development effort of MSET, the fault tree analysis program used was SAPHIRE. SAPHIRE is an acronym for 'Systems Analysis Programs for Hands-on Integrated Reliability Evaluations.' Version 1 of the SAPHIRE code was sponsored by the Nuclear Regulatory Commission in 1987 as an innovative way to draw, edit, and analyze graphical fault trees primarily for safe operation of nuclear power reactors. When the fault tree calculations are performed, the fault tree analysis program will produce several reports that can be used to analyze the MPC&A system. SAPHIRE produces reports showing risk importance factors for all basic events in the operational MC&A system. The risk importance information is used to examine the potential impacts when performance of certain basic events increases or decreases. The initial results produced by the SAPHIRE program are considered relative risk values. None of the results can be interpreted as absolute risk values since the basic event probability values represent estimates of risk associated with the performance of MPC&A tasks throughout the material balance area (MBA). The RRR for a basic event represents the decrease in total system risk that would result from improvement of that one event to a perfect performance level. Improvement of the basic event with the greatest RRR value produces a greater decrease in total system risk than improvement of any other basic event. Basic events with the greatest potential for system risk reduction are assigned performance improvement values, and new fault tree calculations show the improvement in total system risk. The ope

Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

2011-01-01T23:59:59.000Z