Sample records for tampering theft vandalism

  1. Tamper-indicating seals : practices, problems, and standards

    SciTech Connect (OSTI)

    Johnston, R. G. (Roger G.)

    2003-01-01T23:59:59.000Z

    Tamper-indicating seals have been used by customs officials for over 7,000 years. Today, seals are widely used to help counter theft, smuggling, sabotage, vandalism, terrorism, and espionage. Despite their antiquity and modern widespread use, however, there remains considerable confusion about seals, as well as a lot of misconceptions, wishful thinking, sloppy terminology, and poor practice. The absence of meaningful norms and standards, together with the surprisingly limited amount of research and development (R&D) in the field of tamper detection, has also hindered the effective use of seals. The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory has intensively studied tamper-indicating seals for the last 12 years. We have engaged in vulnerability assessments, R&D, consulting, and training for over two dozen United States government agencies and private companies, as well as for the International Atomic Energy Agency (IAEA) and Euratom. The VAT has also analyzed over 200 different types of seals in detail. This paper summarizes some of our conclusions, recommendations, and warnings regarding seals and tamper detection.

  2. Tamper tape seals

    SciTech Connect (OSTI)

    Wright, B.W.; Undem, H.A.

    1994-07-01T23:59:59.000Z

    Tamper tapes are appealing for many applications due to their ease of use and relative robustness. Applications include seals for temporary area denial, protection of sensitive equipment, chain-of-custody audit trails, and inventory control practices. A next generation of adhesive tamper tapes is being developed that combines the best features of commercially available devices with additional state-of-the-art features in tamper indication, tamper-resistance, and counterfeit-resistance. The additional features are based on U.S. Department of Energy (DOE) research and development (R&D) activities that were originally associated with preparations for the Strategic Arms Reduction Treaty (START). New features include rapid-set, chemical-cure adhesive systems that allow user-friendly application and layered levels of counterfeit-resistance based on unique {open_quotes}fingerprint{close_quotes} characteristics that can be accessed as desired.

  3. Tamper indicating bolt

    DOE Patents [OSTI]

    Blagin, Sergei V.; Barkanov, Boris P.

    2004-09-14T23:59:59.000Z

    A tamper-indicating fastener has a cylindrical body with threads extending from one end along a portion of the body, and a tamper indicating having a transducer for converting physical properties of the body into electronic data; electronics for recording the electronic data; and means for communicating the recorded information to a remote location from said fastener. The electronics includes a capacitor that varies as a function of force applied by the fastener, and non-volatile memory for recording instances when the capacitance varies, providing an indication of unauthorized access.

  4. Enhanced tamper indicator

    DOE Patents [OSTI]

    Garcia, Anthony R.; Johnston, Roger G.

    2003-07-08T23:59:59.000Z

    The present invention provides an apparatus and method whereby the reliability and tamper-resistance of tamper indicators can be improved. A flexible connector may be routed through a latch for an enclosure such as a door or container, and the free ends of the flexible connector may be passed through a first locking member and firmly attached to an insert through the use of one or more attachment members such as set screws. A second locking member may then be assembled in interlocking relation with the first locking member to form an interlocked assembly around the insert. The insert may have one or more sharp projections extending toward the first or second locking member so that any compressive force applied in an attempt to disassemble the interlocked assembly results in permanent, visible damage to the first or second locking member.

  5. Tamper-indicating barcode and method

    DOE Patents [OSTI]

    Cummings, Eric B.; Even, Jr., William R.; Simmons, Blake A.; Dentinger, Paul Michael

    2005-03-22T23:59:59.000Z

    A novel tamper-indicating barcode methodology is disclosed that allows for detection of alteration to the barcode. The tamper-indicating methodology makes use of a tamper-indicating means that may be comprised of a particulate indicator, an optical indicator, a deformable substrate, and/or may be an integrated aspect of the barcode itself. This tamper-indicating information provides greater security for the contents of containers sealed with the tamper-indicating barcodes.

  6. Tamper Evident Microprocessors Adam Waksman

    E-Print Network [OSTI]

    Yang, Junfeng

    Tamper Evident Microprocessors Adam Waksman Department of Computer Science Columbia University New- tioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors are vulnerable to insider attacks that can catastrophically com- promise security, integrity

  7. Preventing Theft of Anhydrous Ammonia

    E-Print Network [OSTI]

    Smith, David

    2004-09-16T23:59:59.000Z

    Anhydrous ammonia is widely used as a fertilizer. The theft of anhydrous ammonia for use in producing illegal drugs is a growing problem. This publication describes how thieves operate and how farmers and agricultural dealers can protect themselves...

  8. TAMPERE UNIVERSITY OF TECHNOLOGY DEPARTMENT OF AUTOMATION

    E-Print Network [OSTI]

    TAMPERE UNIVERSITY OF TECHNOLOGY DEPARTMENT OF AUTOMATION An Intelligent Web Service for Operation 2004 Examiner: Prof. Seppo Kuikka #12;2 Abstract TAMPERE UNIVERSITY OF TECHNOLOGY Automation Degree Program Institute of Automation and Control Jaakkola, Veli-Pekka: An Intelligent Web Service for Operation

  9. Integrated optical tamper sensor with planar waveguide

    DOE Patents [OSTI]

    Carson, R.F.; Casalnuovo, S.A.

    1993-01-05T23:59:59.000Z

    A monolithic optical tamper sensor, comprising an optical emitter and detector, connected by an optical waveguide and placed into the critical entry plane of an enclosed sensitive region, the tamper sensor having a myriad of scraps of a material optically absorbent at the wavelength of interest, such that when the absorbent material is in place on the waveguide, an unique optical signature can be recorded, but when entry is attempted into the enclosed sensitive region, the scraps of absorbent material will be displaced and the optical/electrical signature of the tamper sensor will change and that change can be recorded.

  10. Integrated optical tamper sensor with planar waveguide

    DOE Patents [OSTI]

    Carson, Richard F. (Albuquerque, NM); Casalnuovo, Stephen A. (Albuquerque, NM)

    1993-01-01T23:59:59.000Z

    A monolithic optical tamper sensor, comprising an optical emitter and detector, connected by an optical waveguide and placed into the critical entry plane of an enclosed sensitive region, the tamper sensor having a myriad of scraps of a material optically absorbent at the wavelength of interest, such that when the absorbent material is in place on the waveguide, an unique optical signature can be recorded, but when entry is attempted into the enclosed sensitive region, the scraps of absorbent material will be displaced and the optical/electrical signature of the tamper sensor will change and that change can be recorded.

  11. Improving Tamper Detection for Hazardous Waste Security

    SciTech Connect (OSTI)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-02-26T23:59:59.000Z

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them.

  12. 1st Qtr 2nd Qtr 3rd Qtr 4th Qtr Jan -Mar Apr -June July -Sept Oct -Dec Totals

    E-Print Network [OSTI]

    de Lijser, Peter

    Vehicles 2 7 14 3 26 Vehicle Tampering 3 5 1 8 17 Burglary from Vehicle 7 9 20 13 49 Bikes Stolen 5 7 14 6 Forgery 1 3 3 0 7 Identity Theft 0 1 1 1 3 Burglary from Bldg 18 8 5 4 35 Vandalisms 16 30 15 27 88 Total Drug Related 43 21 36 33 133 DUI Arrests 57 55 53 22 187 Thefts 14 1 5 3 23 Identity Theft 0 2 0 0 2

  13. Physical security and tamper-indicating devices

    SciTech Connect (OSTI)

    Johnston, R.G.; Garcia, A.R.E.

    1997-02-01T23:59:59.000Z

    Computer systems, electronic communications, digital data, and computer storage media are often highly vulnerable to physical tampering. Tamper-indicating devices, also called security seals, are widely used to detect physical tampering or unauthorized access. We studied 94 different security seals, both passive and electronic, developed either commercially or by the US government. Most of these seals are in wide-spread use, including for critical applications. We learned how to defeat all 94 seals using rapid, inexpensive, low-tech methods. Cost was not a good predictor of seal security. It appears to us that many of these seals can be dramatically improved with minor, low-cost modifications to either the seal or the use protocol.

  14. Improving tamper detection for hazardous waste security

    SciTech Connect (OSTI)

    Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

    2002-01-01T23:59:59.000Z

    After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

  15. Energy Theft in the Advanced Metering Infrastructure

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    , with this infrastructure comes new risk. In this paper, we consider ad- versary means of defrauding the electrical gridEnergy Theft in the Advanced Metering Infrastructure Stephen McLaughlin, Dmitry Podkuiko, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) Pennsylvania State

  16. Accelerated aging studies and environmental stability of prototype tamper tapes

    SciTech Connect (OSTI)

    Wright, B.W.; Wright, C.W. [Pacific Northwest Lab., Richland, WA (United States); Bunk, A.R. [Battelle Columbus Lab., OH (United States)] [and others

    1995-05-01T23:59:59.000Z

    This report describes the results of accelerated aging experiments (weathering) conducted on prototype tamper tapes bonded to a variety of surface materials. The prototype tamper tapes were based on the patented Confirm{reg_sign} tamper-indicating technology developed and produced by 3M Company. Tamper tapes bonded to surfaces using pressure sensitive adhesive (PSA) and four rapid-set adhesives were evaluated. The configurations of the PSA-bonded tamper tapes were 1.27-cm-wide Confirm{reg_sign} 1700 windows with vinyl underlay and 2.54-cm-wide Confirm{reg_sign} 1700 windows with vinyl and polyester underlays. The configurations of the rapid-set adhesive-bonded tamper tapes were 2.54-cm-wide Confirm{reg_sign} (1700, 1500 with and without primer, and 1300) windows with vinyl underlay. Surfaces used for bonding included aluminum, steel, stainless steel, Kevlar{reg_sign}, brass, copper, fiberglass/resin with and without gel coat, polyurethane-painted steel, acrylonitrile:butadiene:styrene plastic, polyester fiberglass board, Lexan polycarbonate, and cedar wood. Weathering conditions included a QUV cabinet (ultraviolet light at 60{degrees}C, condensing humidity at 40{degrees}C), a thermal cycling cabinet (-18{degrees}C to 46{degrees}C), a Weather-O-Meter (Xenon lamp), and exposure outdoors in Daytona Beach, Florida. Environmental aging exposures lasted from 7 weeks to 5 months. After exposure, the tamper tapes were visually examined and tested for transfer resistance. Tamper tapes were also exposed to a variety of chemical liquids (including organic solvents, acids, bases, and oxidizing liquids) to determine chemical resistance and to sand to determine abrasion resistance.

  17. Novel tamper-indicating protective devices

    SciTech Connect (OSTI)

    DeVolpi, A.

    1995-07-01T23:59:59.000Z

    Several novel tamper-indicating devices, originally developed under DOE auspices for arms control applications, might be useful in nonproliferation. Some devices that have reached the laboratory prototype stage could provide specialized alternatives to established seals. As locks and cables, the following might be useful: (1) a brittle ceramic lock--impervious to toxic, radiation, and thermal extremes--interrogated for identification and continuity by ultrasonic means, (2) a flexible ceramic-fiber seal that also tolerates severe environments, (3) an ultrasonic smart-material strip seal, and (4) an RF-resonant coaxial cable, verified by radio frequency and microwave signals. To validate the identity of secured surfaces, joints, welds, and fasteners--two techniques are applicable: (1) the scanning electron microscope, which examines three- dimensional micron-level topography, and (2) the plastic-casting fingerprint, a simple low-cost technique, analogous to human fingerprinting. The techniques mentioned above have one or more of the potential advantages of low cost, immediate availability, security for large-area enclosures, application to hazardous environments, usability in the FSU, or suitability for covert use.

  18. An Updated Assessement of Copper Wire Thefts from Electric Utilities...

    Office of Environmental Management (EM)

    from Electric Utilities - October 2010 An Updated Assessement of Copper Wire Thefts from Electric Utilities - October 2010 The U.S. Department of Energy (DOE), Office of...

  19. Tamper-indicating device having a glass body

    DOE Patents [OSTI]

    Johnston, Roger G. (Los Alamos, NM); Garcia, Anthony R. E. (Espanola, NM)

    2003-04-29T23:59:59.000Z

    A tamper-indicating device is described. The device has a first glass body member and a second glass body member that are attached to each other through a hasp. The glass body members of the device can be tempered. The body members can be configured with hollow volumes into which powders, microparticles, liquids, gels, or combinations thereof are sealed. The choice, the amount, and the location of these materials can produce a visible, band pattern to provide each body member with a unique fingerprint identifier, which makes it extremely difficult to repair or replace once it is damaged in order to avoid tamper detection.

  20. DEVELOPMENT OF A CERAMIC TAMPER INDICATING SEAL: SRNL CONTRIBUTIONS

    SciTech Connect (OSTI)

    Krementz, D.; Brinkman, K.; Martinez-Rodriguez, M.; Mendez-Torres, A.; Weeks, G.

    2013-06-03T23:59:59.000Z

    Savannah River National Laboratory (SRNL) and Sandia National Laboratories (SNL) are collaborating on development of a Ceramic Seal, also sometimes designated the Intrinsically Tamper Indicating Ceramic Seal (ITICS), which is a tamper indicating seal for international safeguards applications. The Ceramic Seal is designed to be a replacement for metal loop seals that are currently used by the IAEA and other safeguards organizations. The Ceramic Seal has numerous features that enhance the security of the seal, including a frangible ceramic body, protective and tamper indicating coatings, an intrinsic unique identifier using Laser Surface Authentication, electronics incorporated into the seal that provide cryptographic seal authentication, and user-friendly seal wire capture. A second generation prototype of the seal is currently under development whose seal body is of Low Temperature Co-fired Ceramic (LTCC) construction. SRNL has developed the mechanical design of the seal in an iterative process incorporating comments from the SNL vulnerability review team. SRNL is developing fluorescent tamper indicating coatings, with recent development focusing on optimizing the durability of the coatings and working with a vendor to develop a method to apply coatings on a 3-D surface. SRNL performed a study on the effects of radiation on the electronics of the seal and possible radiation shielding techniques to minimize the effects. SRNL is also investigating implementation of Laser Surface Authentication (LSA) as a means of unique identification of each seal and the effects of the surface coatings on the LSA signature.

  1. Guardians at the Gates of Hell : estimating the risk of nuclear theft and terrorism -- and identifying the highest-priority risks of nuclear theft

    E-Print Network [OSTI]

    Bunn, Matthew

    2007-01-01T23:59:59.000Z

    Methods are presented to assess the global risk of nuclear theft and nuclear terrorism, to identify the nuclear facilities and transport legs that pose the highest-priority risks of nuclear theft, and to evaluate policy ...

  2. Ranking of sabotage/tampering avoidance technology alternatives

    SciTech Connect (OSTI)

    Andrews, W.B.; Tabatabai, A.S.; Powers, T.B.; Daling, P.M.; Fecht, B.A.; Gore, B.F.; Overcast, T.D.; Rankin, W.R.; Schreiber, R.E.; Tawil, J.J.

    1986-01-01T23:59:59.000Z

    Pacific Northwest Laboratory conducted a study to evaluate alternatives to the design and operation of nuclear power plants, emphasizing a reduction of their vulnerability to sabotage. Estimates of core melt accident frequency during normal operations and from sabotage/tampering events were used to rank the alternatives. Core melt frequency for normal operations was estimated using sensitivity analysis of results of probabilistic risk assessments. Core melt frequency for sabotage/tampering was estimated by developing a model based on probabilistic risk analyses, historic data, engineering judgment, and safeguards analyses of plant locations where core melt events could be initiated. Results indicate the most effective alternatives focus on large areas of the plant, increase safety system redundancy, and reduce reliance on single locations for mitigation of transients. Less effective options focus on specific areas of the plant, reduce reliance on some plant areas for safe shutdown, and focus on less vulnerable targets.

  3. A study of hand tamper design for compaction of soils

    E-Print Network [OSTI]

    McDonough, Brian

    1961-01-01T23:59:59.000Z

    Determination Standard Oven Dry Method versus Frying Pan Method Grain Size Distribution Curve Centerville Sand 34 Tamper Comparison Chart: Dry Density after 200 Blows per Square Foot of Layer Dry Density versus Compactive Effort Curve on 3. 0 Inch Square... of Utah revealed that a point exists at which an ultimate density is obtained, and any further increase in compaction effort results in lower than ultimate values. Shear Stress and Beari Ca acit If the resistance in a soil is exceeded by applied loads...

  4. Optical-based smart structures for tamper-indicating applications

    SciTech Connect (OSTI)

    Sliva, P.; Anheier, N.C.; Simmons, K.L.; Undem, H.A.

    1996-11-01T23:59:59.000Z

    This report is a compilation of several related projects performed from 1991 through 1996 concerning the design, construction, and application of optical-based smart structure to tamper-indicating and sensing secure containers. Due to several influences, the projects were carried through to varying degrees of completion. Cancellation of the overall project at the client level motivated the authors to gather all of the technology and ideas about smart structures developed during these several projects, whether completed or just conceptualized, into one document. Although each section individually discusses a specific project, the overall document is written chronologically with each successive section showing how increased smart structure complexity was integrated into the container.

  5. UC SANTA BARBARA POLICY AND PROCEDURE Reporting the Loss or Theft of Inventorial Equipment

    E-Print Network [OSTI]

    Bigelow, Stephen

    UC SANTA BARBARA POLICY AND PROCEDURE Reporting the Loss or Theft of Inventorial Equipment Contact OF INVENTORIAL EQUIPMENT Table of Contents Sections Page I Scope....................................................................................... ..3 V. Procedure for Reporting Theft of Inventorial Equipment ............................. ..3 VI

  6. Diffusion of the Texas Cooperative Extension's horse theft awareness and prevention initiative 

    E-Print Network [OSTI]

    Swaim, Pattrick Lee, Jr.

    2006-04-12T23:59:59.000Z

    The primary purpose of this study was to identify the Horse Theft Awareness and Prevention Initiative (HTAPI) participants and the theft prevention practices used in Texas. The secondary purpose was to evaluate the educational ...

  7. Active fiber optic technologies used as tamper-indicating devices

    SciTech Connect (OSTI)

    Horton, P.R.V.; Waddoups, I.G.

    1995-11-01T23:59:59.000Z

    The Sandia National Laboratories (SNL) Safeguards and Seals Evaluation Program is evaluating new fiber optic active seal technologies for use at Department of Energy (DOE) facilities. The goal of the program is to investigate active seal technologies that can monitor secured containers storing special nuclear materials (SNM) within DOE vaults. Specifically investigated were active seal technologies that can be used as tamper-indicating devices to monitor secured containers within vaults while personnel remain outside the vault area. Such a system would allow minimal access into vaults while ensuring container content accountability. The purpose of this report is to discuss tamper-indicating devices that were evaluated for possible DOE use. While previous seal evaluations (Phase I and II) considered overall facility applications, this discussion focuses specifically on their use in vault storage situations. The report will highlight general background information, specifications and requirements, and test procedures. Also discussed are the systems available from four manufacturers: Interactive Technologies, Inc., Fiber SenSys, Inc., Inovonics, Inc., and Valve Security Systems.

  8. Apparatus and method for detecting tampering in flexible structures

    SciTech Connect (OSTI)

    Maxey, Lonnie C. (Knoxville, TN); Haynes, Howard D. (Knoxville, TN)

    2011-02-01T23:59:59.000Z

    A system for monitoring or detecting tampering in a flexible structure includes taking electrical measurements on a sensing cable coupled to the structure, performing spectral analysis on the measured data, and comparing the spectral characteristics of the event to those of known benign and/or known suspicious events. A threshold or trigger value may used to identify an event of interest and initiate data collection. Alternatively, the system may be triggered at preset intervals, triggered manually, or triggered by a signal from another sensing device such as a motion detector. The system may be used to monitor electrical cables and conduits, hoses and flexible ducts, fences and other perimeter control devices, structural cables, flexible fabrics, and other flexible structures.

  9. RESEARCH AT THE AUTOMATION AND CONTROL INSTITUTE OF TAMPERE UNIVERSITY OF TECHNOLOGY

    E-Print Network [OSTI]

    a strong research emphasis on micro system technologies, intelligent systems and applying modern-aided simulation and control system design packages. #12;22 5 RESEARCH AT THE AUTOMATION AND CONTROL INSTITUTE OF TAMPERE UNIVERSITY OF TECHNOLOGY

  10. Tamper-indicating devices and safeguards seals evaluation test report. Volume 2

    SciTech Connect (OSTI)

    Horton, P.R.V.; Waddoups, I.G.

    1995-08-01T23:59:59.000Z

    Volume I was based on a survey and an evaluation of seals that are used as tamper-indicating devices at DOE facilities. For that evaluation, currently available seals were physically and environmentally evaluated under two broad categories: handling durability and tamper resistance. Our study indicated that the environmental testing had no negative effects on the results of the mechanical tests. In Volume II, we evaluate some loop, fiber optic loop, and pressure-sensitive seals that are not used at DOE facilities. However, we continue to focus on qualities required by DOE: durability and tamper resistance. The seals are comparatively rated, and recommendations are made for using currently available seals and new tamper-indicating device technology.

  11. Horse Theft Awareness and Prevention - Identification of Horses

    E-Print Network [OSTI]

    Gibbs, Pete G.; Wall, Leman H.; Householder, Doug

    1998-08-12T23:59:59.000Z

    of proof always seems to lie with the victim. Therefore, permanent identif_ication can aid law enforce- ment agencies and livestock inves- tigators in theft cases. In September 1997, Texas leg- islation took ef_fect to help prevent and investigate horse..., illustrations and natural markings Owners should keep clear photographs of individual horses on file with other paperwork such as registration papers and health records. Precise photographs can help law enforcement authorities and brand inspectors identify sto...

  12. Tamper to delay motion and decrease ionization of a sample during short pulse x-ray imaging

    DOE Patents [OSTI]

    London, Richard A. (Orinda, CA); Szoke; Abraham (Fremont, CA), Hau-Riege; Stefan P. (Fremont, CA), Chapman; Henry N. (Livermore, CA)

    2007-06-26T23:59:59.000Z

    A system for x-ray imaging of a small sample comprising positioning a tamper so that it is operatively connected to the sample, directing short intense x-ray pulses onto the tamper and the sample, and detecting an image from the sample. The tamper delays the explosive motion of the sample during irradiation by the short intense x-ray pulses, thereby extending the time to obtain an x-ray image of the original structure of the sample.

  13. Unaccounted-for gas project. Theft Task Force. Volume 3. Final report

    SciTech Connect (OSTI)

    Cima, K.M.; Cottengim, T.L.; Wong, R.M.; Cowgill, R.M.; Grinstead, J.R.

    1990-06-01T23:59:59.000Z

    The study was aimed at determining unaccounted-for (UAF) gas volumes resulting from operating Pacific Gas and Electric Co.'s transmission and distribution systems during 1987. The Theft Task Force analyzed the percentage of customers involved in gas theft, the average annual volume of gas stolen by a single customer, and the total number of customers and their total gas usage. Results were used in conjunction with documented customer theft to arrive at a calculation that more accurately reflected the theft contribution to UAF for 1987.

  14. Tamper indicating and sensing optical-based smart structures

    SciTech Connect (OSTI)

    Sliva, P.; Anheier, N.C.; Gordon, N.R.; Simmons, K.L.; Stahl, K.A.; Undem, H.A.

    1995-05-01T23:59:59.000Z

    This paper has presented an overview of the type of optical-based structures that can be designed and constructed. These smart structures are capable of responding to their environment. The examples given represent a modest sampling of the complexity that can be achieved in both design and practice. Tamper-indicating containers and smart, sensing windows demonstrate just a few of the applications. We have shown that optical-based smart structures can be made multifunctional with the sensing built in. The next generation smart structure will combine the sensing functionality of these optical-based smart structures with other sensors such as piezoelectrics and electro-rheological fluids to not only be able to respond to the environment, but to adapt to it as well. An example of functionality in this regime would be a piezosensor that senses pressure changes (e.g., shock waves), which then causes an electro-rheological fluid to change viscosity. A fiber sensor located in or near the electro-rheological fluid senses the stiffness change and sends a signal through a feedback loop back to the piezosensor for additional adjustments to the electro-rheological fluid.

  15. Transgressing the Law: Karma, Theft and Its Punishment

    E-Print Network [OSTI]

    Whitecross, Richard W

    2008-01-01T23:59:59.000Z

    black clouds had hid, Likewise rarely, through the buddhas’ power, Virtuous thoughts rise, brief and transient, in the world” (1.5:34) Shantideva 2003 The Way of the Bodhisattva 14 Raksha Mang cham appears to be based on chapter 13 of Karma Lingpa... and local tradition of his teachings which have conferred power and authority on the state” (ibid. ). The Lo rgyus may only refer in passing to acts of theft and brigandage, yet it reveals the general tenor of the Drukpa state and its approach towards...

  16. NTL Detection of Electricity Theft and Abnormalities for Large Power Consumers In TNB Malaysia

    E-Print Network [OSTI]

    Ducatelle, Frederick

    in power utilities originating from electricity theft and other customer malfeasances are termed as Non]. Investigations are undertaken by electric utility companies to assess the impact of technical lossesNTL Detection of Electricity Theft and Abnormalities for Large Power Consumers In TNB Malaysia J

  17. TamperEvident, HistoryIndependent, SubliminalFree Data Structures on PROM Storage

    E-Print Network [OSTI]

    Wagner, David

    , even if the vote storage mechanism is reliable, catastrophic events like power loss and battery failureTamper­Evident, History­Independent, Subliminal­Free Data Structures on PROM Storage ­or­ How constructions for the vote storage unit of an electronic voting machine. In this application, the record

  18. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated

  19. Geographies of identity theft in the u.s.: understanding spatial and demographic patterns, 2002-2006

    E-Print Network [OSTI]

    Lane, Gina W.

    2009-05-15T23:59:59.000Z

    result, there are numerous attempts at defining what is (and is not) identity theft. Researchers generally agree that identity theft involves the fraudulent misuse of personal information for illegal activity and unauthorized personal gain, but some... documents issued, Social Security card issued/ forged, Unspecified Loan Fraud 6% (9,712) 5% (12,301) - Business/ Personal/ Student loan, Auto loan, Real estate loan, Unspecified Other Identity Theft 16% (25,903) 24% (59,048) - Illegal...

  20. ENHANCED SAFEGUARDS: THE ROLE OF SMART FUNCTIONAL COATINGS FOR TAMPER INDICATION

    SciTech Connect (OSTI)

    Mendez-Torres, A.; Martinez-Rodriguez, M.; Brinkman, K.; Krementz, D.

    2012-02-24T23:59:59.000Z

    This work investigates the synthesis of smart functional coatings (SFC) using chemical solution deposition methods. Chemical solution deposition methods have recently received attention in the materials research community due to several unique advantages that include low temperature processing, high homogeneity of final products, the ability to fabricate materials with controlled surface properties and pore structures, and the ease of dopant incorporation in controlled concentrations. The optical properties of thin films were investigated using UV-Vis spectroscopy, Raman, SEM and EDS, with the aim of developing a protective transparent coating for a ceramic surface as a first line of defense for tamper indication. The signature produced by the addition of rare earth dopants will be employed as an additional tamper indicating feature. The integration of SFC's as part of a broader verification system such as an electronic seals can provide additional functionality and defense in depth. SFC's can improve the timeliness of detection by providing a robust, in-situ verifiable tamper indication framework.

  1. "Bait vehicle" technologies and motor vehicle theft along the southwest border.

    SciTech Connect (OSTI)

    Aldridge, Chris D.

    2007-09-01T23:59:59.000Z

    In 2005, over 33% of all the vehicles reported stolen in the United States occurred in the four southwestern border states of California, Arizona, New Mexico, and Texas, which all have very high vehicle theft rates in comparison to the national average. This report describes the utilization of 'bait vehicles' and associated technologies in the context of motor vehicle theft along the southwest border of the U.S. More than 100 bait vehicles are estimated to be in use by individual agencies and auto theft task forces in the southwestern border states. The communications, tracking, mapping, and remote control technologies associated with bait vehicles provide law enforcement with an effective tool to obtain arrests in vehicle theft 'hot spots'. Recorded audio and video from inside the vehicle expedite judicial proceedings as offenders rarely contest the evidence presented. At the same time, law enforcement is very interested in upgrading bait vehicle technology through the use of live streaming video for enhanced officer safety and improved situational awareness. Bait vehicle effectiveness could be enhanced by dynamic analysis of motor theft trends through exploitation of geospatial, timeline, and other analytical tools to better inform very near-term operational decisions, including the selection of particular vehicle types. This 'information-led' capability would especially benefit from more precise and timely information on the location of vehicles stolen in the United States and found in Mexico. Introducing Automated License Plate Reading (ALPR) technology to collect information associated with stolen motor vehicles driven into Mexico could enhance bait vehicle effectiveness.

  2. Crime Alert -Theft of Electronic Devices & A Personal Safety Reminder To follow up on the UCPD personal safety update sent to the community on the trends involving the theft of

    E-Print Network [OSTI]

    Mills, Allen P.

    Crime Alert - Theft of Electronic Devices & A Personal Safety Reminder To follow up on the UCPD personal safety update sent to the community on the trends involving the theft of electronic devices device on personal electronic devices. In addition to the recovery of those items, officers assigned

  3. Smart Insulating Container with Anti-Theft Features by M2M Tracking

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    Smart Insulating Container with Anti-Theft Features by M2M Tracking Cheng-Ting Lee, Chun-Min ChangChen, Brucelai, TroyChiu}@itri.org.tw, pai.chou@gmail.com Abstract--This paper describes a smart insulating and responsive but also of low overhead. I. INTRODUCTION Smart insulating shipping containers are an important

  4. Victim of Identity Theft or Fraud Immediately report the crime to your local law

    E-Print Network [OSTI]

    de Lijser, Peter

    as the anticipation, the recognition and the appraisal of a crime risk and the initiation of some action to remove Theft Dumpster Diving ­ Is when criminals go through your trash to obtain thrown out mail that contains legitimate enterprise in an attempt to obtain private information. Vishing ­ Is contacting the public via

  5. From Robotic Toil to Symbolic Theft: Grounding Transfer from EntryLevel to HigherLevel Categories

    E-Print Network [OSTI]

    Harnad, Stevan

    1 From Robotic Toil to Symbolic Theft: Grounding Transfer from Entry­Level to Higher Keywords: symbol grounding, categorical perception, neural networks, robotics, pattern recognition Note International Conference on Artificial Neural Networks, Skovde, September 1998. #12; 2 From Robotic Toil

  6. Time-Domain Reflectometry for Tamper Indication in Unattended Monitoring Systems for Safeguards

    SciTech Connect (OSTI)

    Tedeschi, Jonathan R.; Smith, Leon E.; Moore, David E.; Sheen, David M.; Conrad, Ryan C.

    2014-12-17T23:59:59.000Z

    The International Atomic Energy Agency (IAEA) continues to expand its use of unattended, remotely monitored measurement systems. An increasing number of systems and an expanding family of instruments create challenges in terms of deployment efficiency and the implementation of data authentication measures. Pacific Northwest National Laboratory (PNNL) leads a collaboration that is exploring various tamper-indicating (TI) measures that could help to address some of the long-standing detector and data-transmission authentication challenges with IAEA’s unattended systems. PNNL is investigating the viability of active time-domain reflectometry (TDR) along two parallel but interconnected paths: (1) swept-frequency TDR as the highly flexible, laboratory gold standard to which field-deployable options can be compared, and (2) a low-cost commercially available spread-spectrum TDR technology as one option for field implementation. This report describes PNNL’s progress and preliminary findings from the first year of the study, and describes the path forward.

  7. Theft of the Mind: An Innovative Approach to Plagiarism and Copyright Education 

    E-Print Network [OSTI]

    Clement, Gail; Brenenson, Stephanie

    2013-01-01T23:59:59.000Z

    of the Mind: Tales of Piracy and Plagiarism from History to Hollywood,? was approved by the Associate Provost for Undergraduate Studies and added to the group of carefully se- lected offerings for the First Year Seminar program in the fall of 2011. After..., duration of the sessions, amount of homework time available, facilities and resources available, and individual characteristics of the enrolled students (age group, level of study, major discipline selected). In the case of the freshman seminar Theft...

  8. Study of the 1991 unaccounted-for gas volume at the Southern California Gas Company. Final report, January 1991-December 1992. Volume 5. Theft

    SciTech Connect (OSTI)

    Meshkati, S.; Groot, J.; Fiero, G.; Harris, G.; Ozenne, D.

    1993-04-01T23:59:59.000Z

    As part of a study of unaccounted-for gas (UAF) at the Southern California Gas Company (SoCalGas), volume V of the six-volume set examines losses due to theft. Residential and non-residential (commercial and industrial) theft are distinguished. Analysis involves estimating both frequencies of occurrence and the volumes associated with such occurrence. Approaches and techniques of detection and control are discussed. The problem in developing estimates is that theft is difficult to detect. The study finds that theft contributes approximately 644,529 thousand cubic feet to the 1991 UAF. Residential theft is estimated at 324,227 Mcf and non-residential theft at 320,302 Mcf.

  9. October 28, 2009, Fraud and Theft in the Information Age - Companion Book

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagementOPAM Policy AcquisitionWeatherizationDepartment ofFraud and Theft

  10. Intelligent System for Detection of Abnormalities and Theft of Electricity using Genetic Algorithm and Support Vector Machines

    E-Print Network [OSTI]

    Ducatelle, Frederick

    ) analysis in electric utilities using Genetic Algorithm (GA) and Support Vector Machine (SVM). The main. Keywords: Support vector machine, Genetic algorithm, Electricity theft, Non-technical loss, Data mining. 1. Introduction Electricity utilities lose large amounts of money each year due to fraud by electricity consumers

  11. Smart Phone Users BEWARE!! The NYPD is reporting an increase in the theft of electronic devices from

    E-Print Network [OSTI]

    Papavasiliou, F. Nina

    Smart Phone Users BEWARE!! The NYPD is reporting an increase in the theft of electronic devices. Don't display it when not in use. Use a hands free device. · Change the color of your earphones from blocks and head for an area where people are or to the nearest open store. · Password protect your device

  12. DEVELOPMENT OF A TAMPER RESISTANT/INDICATING AEROSOL COLLECTION SYSTEM FOR ENVIRONMENTAL SAMPLING AT BULK HANDLING FACILITIES

    SciTech Connect (OSTI)

    Sexton, L.

    2012-06-06T23:59:59.000Z

    Environmental sampling has become a key component of International Atomic Energy Agency (IAEA) safeguards approaches since its approval for use in 1996. Environmental sampling supports the IAEA's mission of drawing conclusions concerning the absence of undeclared nuclear material or nuclear activities in a Nation State. Swipe sampling is the most commonly used method for the collection of environmental samples from bulk handling facilities. However, augmenting swipe samples with an air monitoring system, which could continuously draw samples from the environment of bulk handling facilities, could improve the possibility of the detection of undeclared activities. Continuous sampling offers the opportunity to collect airborne materials before they settle onto surfaces which can be decontaminated, taken into existing duct work, filtered by plant ventilation, or escape via alternate pathways (i.e. drains, doors). Researchers at the Savannah River National Laboratory and Oak Ridge National Laboratory have been working to further develop an aerosol collection technology that could be installed at IAEA safeguarded bulk handling facilities. The addition of this technology may reduce the number of IAEA inspector visits required to effectively collect samples. The principal sample collection device is a patented Aerosol Contaminant Extractor (ACE) which utilizes electrostatic precipitation principles to deposit particulates onto selected substrates. Recent work has focused on comparing traditional swipe sampling to samples collected via an ACE system, and incorporating tamper resistant and tamper indicating (TRI) technologies into the ACE system. Development of a TRI-ACE system would allow collection of samples at uranium/plutonium bulk handling facilities in a manner that ensures sample integrity and could be an important addition to the international nuclear safeguards inspector's toolkit. This work was supported by the Next Generation Safeguards Initiative (NGSI), Office of Nonproliferation and International Security (NIS), National Nuclear Security Administration (NNSA).

  13. THE ATTRACTIVENESS OF MATERIALS IN ADVANCED NUCLEAR FUEL CYCLES FOR VARIOUS PROLIFERATION AND THEFT SCENARIOS

    SciTech Connect (OSTI)

    Bathke, C. G.; Ebbinghaus, Bartley B.; Collins, Brian A.; Sleaford, Brad W.; Hase, Kevin R.; Robel, Martin; Wallace, R. K.; Bradley, Keith S.; Ireland, J. R.; Jarvinen, G. D.; Johnson, M. W.; Prichard, Andrew W.; Smith, Brian W.

    2012-08-29T23:59:59.000Z

    We must anticipate that the day is approaching when details of nuclear weapons design and fabrication will become common knowledge. On that day we must be particularly certain that all special nuclear materials (SNM) are adequately accounted for and protected and that we have a clear understanding of the utility of nuclear materials to potential adversaries. To this end, this paper examines the attractiveness of materials mixtures containing SNM and alternate nuclear materials associated with the plutonium-uranium reduction extraction (Purex), uranium extraction (UREX), coextraction (COEX), thorium extraction (THOREX), and PYROX (an electrochemical refining method) reprocessing schemes. This paper provides a set of figures of merit for evaluating material attractiveness that covers a broad range of proliferant state and subnational group capabilities. The primary conclusion of this paper is that all fissile material must be rigorously safeguarded to detect diversion by a state and must be provided the highest levels of physical protection to prevent theft by subnational groups; no 'silver bullet' fuel cycle has been found that will permit the relaxation of current international safeguards or national physical security protection levels. The work reported herein has been performed at the request of the U.S. Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for, the nuclear materials in DOE nuclear facilities. The methodology and findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security is discussed.

  14. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect (OSTI)

    Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

    2011-10-05T23:59:59.000Z

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  15. Lean Production Using Modular Construction: Study of the Ministry of Education's Projects in Saudi Arabia

    E-Print Network [OSTI]

    Alshayeb, Mohammed Jawad

    2011-12-16T23:59:59.000Z

    ordering, overproduction, wrong storage, wrong handling, manufacturing defects, and theft or vandalism (Garas, Anis, and El Gammal 2001). Alshayeb 13"" 2.2.1 Waste of Materials Material waste is a huge area of waste in construction. Bossink...

  16. CRIME STATS 1st Qtr 2nd Qtr 3rd Qtr 4th Qtr

    E-Print Network [OSTI]

    de Lijser, Peter

    9 20 Bikes Stolen 18 8 12 8 46 Petty Theft 36 25 36 46 143 Grand Thefts 15 12 11 10 48 Poss. of Stolen Property 3 6 8 2 19 Forgery 2 0 1 2 5 Identity Theft 1 2 1 1 5 Burglary from Bldg 9 11 8 15 43 Identity Theft 0 2 2 0 4 Burglaries 1 2 7 6 16 Vandalisms 3 1 3 0 7 Outstanding Warrant 11 8 15 11 45

  17. Tamper indicating seal

    DOE Patents [OSTI]

    Romero, Juan A. (Albuquerque, NM); Walker, Charles A. (Albuquerque, NM); Blair, Dianna S. (Albuquerque, NM); Bodmer, Connie C. (Albuquerque, NM)

    2012-05-29T23:59:59.000Z

    Seals have a flexible wire that can be looped through a hasp-like device. The seals include a body having a recess, a plug insertable into the recess and a snap ring for fastening the plug to the body. The plug and/or body can have access holes for inserting the wire into the recess. "Teeth" on the outer diameter and through-holes through the thickness of the snap ring allow for passing the ends of the flexible wire from the recess through the snap ring. The ends of the wire can be folded back over the snap ring and into engagement with the teeth. Assembly of the seal causes the ends of the wire to be securely fastened between the teeth of the snap ring and the sidewall of the recess. Seals can include a plug and/or body made of a frangible material such as glass, ceramic, glass-ceramic or brittle polymer.

  18. Tamper resistant magnetic stripes

    DOE Patents [OSTI]

    Naylor, Richard Brian (Albuquerque, NM); Sharp, Donald J. (Albuquerque, NM)

    1999-01-01T23:59:59.000Z

    This invention relates to a magnetic stripe comprising a medium in which magnetized particles are suspended and in which the encoded information is recorded by actual physical rotation or alignment of the previously magnetized particles within the flux reversals of the stripe which are 180.degree. opposed in their magnetic polarity. The magnetized particles are suspended in a medium which is solid, or physically rigid, at ambient temperatures but which at moderately elevated temperatures, such as 40.degree. C., is thinable to a viscosity permissive of rotation of the particles therein under applications of moderate external magnetic field strengths within acceptable time limits.

  19. Sun Mon Tues Wed Thur Fri Sat Totals Stolen Vehicles 1 1 3 0 1 1 3 10

    E-Print Network [OSTI]

    de Lijser, Peter

    1 6 2 1 19 Burglary from Vehicle 0 7 8 15 6 6 3 45 Stolen Bikes 2 5 12 17 19 4 0 59 Petty Theft 3 22 0 0 1 1 2 1 0 5 Identity Theft 0 1 5 1 1 0 0 8 Burglary from Bldg 1 1 3 0 1 1 3 10 Vandalisms 6 8 24 6 3 12 17 19 11 79 Thefts 1 3 2 8 1 3 3 21 Identity Theft 1 2 0 0 0 0 0 3 Burglaries 0 1 0 7 4 0 0

  20. The effects of community education on antisocial behavior occurring in public schools

    E-Print Network [OSTI]

    Brown, Nan Ellyn

    1977-01-01T23:59:59.000Z

    , as well as rapes, extortions, burglaries, thefts, and an unprecedented wave of wanton vandalism and destruction (Senate Judiciary Subcom- mittee to Investigate Juvenile Delinquency, 1975:3). In the light of these sobering facts and figures which have... incidents per quarter in the pre-Community Education period to 13 incidents per quarter in the Community Education period. Surprisingly, auto theft, destruction of property, and traffic accidents also decreased signifi- cantly with the implementation...

  1. Power Theft The Silent Crime'

    E-Print Network [OSTI]

    Wang, Xiaorui "Ray"

    of the buildings had been intention prominent lawyer, an electrical engi tems also report losses to thieves of all dollar losses. a program to combat it.3 In 1971, the Potomac Electric Power Company Usually estimated losses of almost $1 million. When a customer steals from the utility, the company absorbs the loss

  2. Laser speckle photography for surface tampering detection

    E-Print Network [OSTI]

    Shih, YiChang

    2012-01-01T23:59:59.000Z

    It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To address this challenge, we introduce a new imaging ...

  3. Laser speckle photography for surface tampering detection

    E-Print Network [OSTI]

    Shih, YiChang

    It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To address this challenge, we introduce a new imaging ...

  4. CRIME STATS Sun Mon Tues Wed Thur Fri Sat Totals

    E-Print Network [OSTI]

    de Lijser, Peter

    7 36 Vehicle Tampering 1 3 1 2 3 3 1 14 Burglary from Vehicle 0 0 0 0 0 0 0 0 Stolen Bikes 2 17 20 Property 0 3 0 2 4 3 2 14 Forgery 0 1 2 1 2 1 0 7 Identity Theft 0 1 0 2 0 2 0 5 Burglary from Bldg 1 3 5 6 13 11 11 18 34 33 154 Thefts 1 2 2 0 6 3 0 14 Identity Theft 0 1 0 3 0 3 0 7 Burglaries 1 0 2 5 5 0 0

  5. CRIME STATS Sun Mon Tues Wed Thur Fri Sat Totals

    E-Print Network [OSTI]

    de Lijser, Peter

    3 27 Vehicle Tampering 0 2 5 1 0 1 0 9 Burglary from Vehicle 0 1 0 1 1 2 0 5 Stolen Bikes 6 15 8 9 0 2 2 2 2 1 1 10 Forgery 0 1 0 2 2 1 0 6 Identity Theft 0 0 0 3 2 1 0 6 Burglary from Bldg 1 6 4 4 3 29 13 23 24 18 139 DUI Arrests 29 13 12 11 11 33 29 138 Thefts 0 0 0 3 3 0 2 8 Identity Theft 0 0 0 0

  6. Identity Theft: What You Need to Know

    Broader source: Energy.gov [DOE]

    Registration link:  CHRIS   002664/0002. No registration is required.  However, if you want credit for the training, you must register in CHRIS.  

  7. COMMUNITY ALERT INCIDENT: Catalytic Converter Thefts

    E-Print Network [OSTI]

    Rose, Michael R.

    converter is a part used to reduce the toxicity of emissions from an internal combustion engine. What can

  8. An Economic Approach to Motor Vehicle Theft

    E-Print Network [OSTI]

    Carcach, Carlos

    2010-01-01T23:59:59.000Z

    annual cost of this form of illegal activity at 654 millionthat uses inputs from a market of illegal labour to generatea supply of illegal goods that are traded in a product

  9. Horse Theft Awareness and Prevention - 15 Steps to Minimizing Theft of Horses and Equipment

    E-Print Network [OSTI]

    Gibbs, Pete G.

    2003-09-26T23:59:59.000Z

    For more information or more specif_ic guidelines for individual situations, contact law enforce- ment (police, sherif_f departments) authorities in your town, city or county. Many communities have crime prevention guidelines, sug- gestions or programs...

  10. Believing Your Eyes: Strengthening the Reliability of Tags and Seals

    SciTech Connect (OSTI)

    Brim, Cornelia P.; Denlinger, Laura S.

    2013-07-01T23:59:59.000Z

    NNSA’s Office of Nonproliferation and International Security (NIS) is working together with scientific experts at the DOE national laboratories to develop the tools needed to safeguard and secure nuclear material from diversion, theft, and sabotage--tasks critical to support future arms control treaties that may involve the new challenge of monitoring nuclear weapons dismantlement. Use of optically stimulated luminescent material is one method to enhance the security and robustness of existing tamper indicating devices such as tags and seals.

  11. Tampering detection system using quantum-mechanical systems

    DOE Patents [OSTI]

    Humble, Travis S. (Knoxville, TN); Bennink, Ryan S. (Knoxville, TN); Grice, Warren P. (Oak Ridge, TN)

    2011-12-13T23:59:59.000Z

    The use of quantum-mechanically entangled photons for monitoring the integrity of a physical border or a communication link is described. The no-cloning principle of quantum information science is used as protection against an intruder's ability to spoof a sensor receiver using a `classical` intercept-resend attack. Correlated measurement outcomes from polarization-entangled photons are used to protect against quantum intercept-resend attacks, i.e., attacks using quantum teleportation.

  12. Museum security and the Thomas Crown Affair.

    SciTech Connect (OSTI)

    Michaud, E. C. (Nuclear Engineering Division)

    2010-01-01T23:59:59.000Z

    Over the years, I've daydreamed about stealing a Vermeer, a Picasso, or Rembrandt. It tickles me, as much as watching the reboot of The Thomas Crown Affair. Why is it, do you suppose, so much fun to think about stealing a world renowned piece off the wall of a major metropolitan museum? Is it the romantic thoughts of getting away with it, walking past infrared detectors, and pressure sensors ala Indiana Jones with the sack of sand to remove the idol without triggering the security system? Is it the idea of snatching items with such fantastic prices, where the romance of possessing an item of such value is less intoxicating than selling it to a private collector for it to never be seen again? I suspect others share my daydreams as they watch theater or hear of a brazen daylight heist at museums around the world, or from private collections. Though when reality sets in, the mind of the security professional kicks in. How could one do it, why would one do it, what should you do once it's done? The main issue a thief confronts when acquiring unique goods is how to process or fence them. They become very difficult to sell because they are one-of-a-kind, easy to identify, and could lead to the people involved with the theft. The whole issue of museum security takes up an ironic twist when one considers the secretive British street artist 'Banksy'. Banksy has made a name for himself by brazenly putting up interesting pieces of art in broad daylight (though many critics don't consider his work to be art) on building walls, rooftops, or even museums. I bring him up for a interesting take on what may become a trend in museum security. In March of 2005, Banksy snuck a piece of his called 'Vandalized Oil Painting' into the Brooklyn Museum's Great Historical Painting Wing, plus 3 other pieces into major museums in New York. Within several days, 2 paintings had been torn down, but 2 stayed up much longer. In his home country of the UK, a unauthorized piece he created and placed in the British Museum known as 'Early Man Goes to Market' received different treatment when placed inside the walls. It was adopted into the permanent collection! I like his story because it's so counter-intuitive. Who would have thought that modern museum security might involve preventing people not just from stealing art, but from sneaking 'unauthorized' art into museums? What is next, tampering with the archive records in order to make it look like the piece in question has always been there? To learn more about museum security, I interviewed multiple experts in the field. It turns out that the glamorous lifestyle of Thomas Crown is not particularly relevant. In fact, usually nobody can point to a Mr. Big of the underworld coordinating thefts, though some organized crime families have been known to use stolen art as black market chips to trade. The common consensus among experts in the field of art theft is that, instead of most high-value pieces being stolen by outsiders with a blue print in hand and rappelling from a ceiling skylight, in reality, 80 percent of art thefts involve insiders or accomplices that execute the crime over a period of time while working or volunteering in the museum. Indeed, according to FBI statistics, between 70 and 80 percent of all solved art theft cases involve insider participation of some kind, yet according to Tom Cremers of the Musuem Security Network, 'Having been involved in risk assessments in over hundreds of museums over the past ten years, it is quite astonishing how rarely the risk of insider participation is discussed.' In regards to the insider threat, a museum is not much different from any corporation or other organization. There are directors, employees, interns, and cleaning staff (very often outsourced), security guards (again outsourced, typically with very high turnover rates). Unlike corporations, most museums also have volunteer staff, docents, and authorized visiting scholars. All these people can potentially take advantage of their position, or to be exploited by a clever attacker on the outside or insid

  13. Holmes: A Data Theft Forensic Framework Ramya Jayaram Masti #1

    E-Print Network [OSTI]

    Lenders, Vincent

    on factors like network link utilization, rate of change of host memory and network heterogeneity. We show

  14. An Updated Assessement of Copper Wire Thefts from Electric Utilities -

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 RussianBy:Whether you're a16-17,2-13) All OtherDepartmentEnergyOctober 2010 |

  15. An Updated Assessement of Copper Wire Thefts from Electric Utilities -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of1Albuquerque, NMPerformance |Should Know to CompleteEnergy

  16. Safeguards summary event list (SSEL), January 1, 1990--December 31, 1995

    SciTech Connect (OSTI)

    NONE

    1996-07-01T23:59:59.000Z

    The Safeguards Summary Event List (SSEL), Vol. 2, Rev. 4, provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the U.S. Nuclear Regulatory Commission (NRC) which occurred and were reported from January 1, 1990, rough December 31, 1995. Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of Bomb-related, Intrusion, Missing and/or Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms, Radiological Sabotage, Nonradiological Sabotage, and Miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels.

  17. Safeguards Summary Event List (SSEL), January 1, 1990--December 31, 1996, Vol. 2, Rev. 5

    SciTech Connect (OSTI)

    NONE

    1997-07-01T23:59:59.000Z

    The Safeguards Summary Event List (SSEL), Vol. 2, Rev. 5, provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC) which occurred and were reported from January 1, 1990, through December 31, 1996. Because of public interest, the Miscellaneous category includes a few events which involve either source material, byproduct material, or natural uranium which are exempt from safeguards requirements. Events are described under the categories of Bomb-related, Intrusion, Missing and/or Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms, Radiological Sabotage, Nonradiological Sabotage, and Miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels.

  18. What is identity theft? Identity theft is a serious problem affecting millions of people each year. It involves acquiring key pieces of someone's

    E-Print Network [OSTI]

    Rusu, Adrian

    that all balances and receipts match and no activity is unaccounted for. If you use a computer, install

  19. A game theory model for electricity theft detection and privacy-aware control in AMI systems

    E-Print Network [OSTI]

    Cardenas, Alvaro A.

    We introduce a model for the operational costs of an electric distribution utility. The model focuses on two of the new services that are enabled by the Advanced Metering Infrastructure (AMI): (1) the fine-grained anomaly ...

  20. Touching the void : the museological implications of theft on public art collections 

    E-Print Network [OSTI]

    Seaton, Jillian Elizabeth

    2014-06-27T23:59:59.000Z

    Of central importance to this thesis is the way security measures contradict the process through which museums have been seeking to divest themselves of theoretical hierarchies and value judgments in recent years. A ...

  1. Experimentally Examining the Effects of a Neighborhood Intervention to Reduce Theft in Multiple City Neighborhoods

    E-Print Network [OSTI]

    Evensen, Paul E.

    2010-04-21T23:59:59.000Z

    following implementation of the neighborhood (and city-wide) intervention. When implemented as a package, these interventions brought about more marked reductions in property crime. Systematic replication of this neighborhood intervention across additional...

  2. Theft of the Mind: An Innovative Approach to Plagiarism and Copyright Education

    E-Print Network [OSTI]

    Clement, Gail; Brenenson, Stephanie

    2013-01-01T23:59:59.000Z

    real-life case of alleged copyright infringement and then evaluated the defendant?s claim of fair use using the Four Factors test required by US copyright law. The points and counterpoints made by the students in the in-class discussion of ?Fair Use... it in our name? (para. 14). The authors of this chapter have interpreted this explanation to embody and apply to both plagiarism and copyright infringement. In the former case, the student may gain something (a good grade, respect, additional...

  3. Copyright and Publishing Literacy for ETD Authors: Applying the Theft of the Mind Model

    E-Print Network [OSTI]

    Clement, Gail; Bianchi, Jo Ann

    2013-02-28T23:59:59.000Z

    U, G Identify a credible source on campus for guidance on infringement avoidance Use and Misused defined User Indicator 2, Outcome e U, G Explain why the concepts of ?original authorship? and ?uniquely new creation? is changing in the 21st... of publishing an article in an open access journal Info handling choices User, Author Broadest possible access to published research and other scholarly writings G List two legal consequences a student may face if found to have infringed copyright...

  4. Diffusion of the Texas Cooperative Extension's horse theft awareness and prevention initiative

    E-Print Network [OSTI]

    Swaim, Pattrick Lee, Jr.

    2006-04-12T23:59:59.000Z

    Counties and yielded 56 usable instruments. Using DillmanÂ?s (2000) procedures, data from participants of the HTAPI programs were collected using two mailed survey instruments. One hundred ninety two participants of the 2004 Mare Foal, Basic Horse...

  5. The development of a curb valve flow meter for gas theft detection

    E-Print Network [OSTI]

    Fitzgerald, Kevin Francis

    1984-01-01T23:59:59.000Z

    As the supply of natural gas continues to dwindle, and government decontrol of pricing progresses, the rising cost of this essential natural resource will drive more individuals to consider various forms of pilferage as a ...

  6. An Updated Assessment of Copper Wire Thefts from Electric Utilities Page 1

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'s Reply Comments AT&T,FACT SAmes Lab PlaysDepartment ofUpdated

  7. Cognitive Radio will revolutionize American transportation

    ScienceCinema (OSTI)

    None

    2013-12-06T23:59:59.000Z

    Cognitive Radio will revolutionize American transportation. Through smart technology, it will anticipate user needs; detect available bandwidths and frequencies then seamlessly connect vehicles, infrastructures, and consumer devices; and it will support the Department of Transportation IntelliDrive Program, helping researchers, auto manufacturers, and Federal and State officials advance the connectivity of US transportation systems for improved safety, mobility, and environmental conditions. Using cognitive radio, a commercial vehicle will know its driver, onboard freight and destination route. Drivers will save time and resources communicating with automatic toll booths and know ahead of time whether to stop at a weigh station or keep rolling. At accident scenes, cognitive radio sensors on freight and transportation modes can alert emergency personnel and measure on-site, real-time conditions such as a chemical leak. The sensors will connect freight to industry, relaying shipment conditions and new delivery schedules. For industry or military purposes, cognitive radio will enable real-time freight tracking around the globe and its sensory technology can help prevent cargo theft or tampering by alerting shipper and receiver if freight is tampered with while en route. For the average consumer, a vehicle will tailor the transportation experience to the passenger such as delivering age-appropriate movies via satellite. Cognitive radio will enhance transportation safety by continually sensing what is important to the user adapting to its environment and incoming information, and proposing solutions that improve mobility and quality of life.

  8. Cognitive Radio will revolutionize American transportation

    SciTech Connect (OSTI)

    None

    2013-07-22T23:59:59.000Z

    Cognitive Radio will revolutionize American transportation. Through smart technology, it will anticipate user needs; detect available bandwidths and frequencies then seamlessly connect vehicles, infrastructures, and consumer devices; and it will support the Department of Transportation IntelliDrive Program, helping researchers, auto manufacturers, and Federal and State officials advance the connectivity of US transportation systems for improved safety, mobility, and environmental conditions. Using cognitive radio, a commercial vehicle will know its driver, onboard freight and destination route. Drivers will save time and resources communicating with automatic toll booths and know ahead of time whether to stop at a weigh station or keep rolling. At accident scenes, cognitive radio sensors on freight and transportation modes can alert emergency personnel and measure on-site, real-time conditions such as a chemical leak. The sensors will connect freight to industry, relaying shipment conditions and new delivery schedules. For industry or military purposes, cognitive radio will enable real-time freight tracking around the globe and its sensory technology can help prevent cargo theft or tampering by alerting shipper and receiver if freight is tampered with while en route. For the average consumer, a vehicle will tailor the transportation experience to the passenger such as delivering age-appropriate movies via satellite. Cognitive radio will enhance transportation safety by continually sensing what is important to the user adapting to its environment and incoming information, and proposing solutions that improve mobility and quality of life.

  9. Finnland Espoo Helsinki Lapeenranta Tampere Turku Frankreich Als Bordeaux Cergy Clermont-Ferrand Gif-sur-Yvette Grenoble

    E-Print Network [OSTI]

    Hoffmann, Rolf

    · Trabzon · Ungarn · Budapest · Veszprém · Vereinigtes Königreich · Aberystwyth · Birmingham · Bristol

  10. ECE 597AB/697AB Security Engineering Syllabus, Spring 2012

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    implementations. Types of attack -- web exploits, card fraud, hardware hacks, electronic warfare , tampering

  11. Reconstruction through collaboration: Negotiation of the housing process in disaster recovery

    E-Print Network [OSTI]

    Hamid, Bauni

    2012-01-01T23:59:59.000Z

    Figure 6.1: Tsunami early warning system installed intsunami-earthquake early warning system occurred. Vandalism103 Figure 6.1: Tsunami early warning system installed in

  12. Physics Division ESH Bulletin 03-2 COMPRESSED GASES SECURITY ALERT

    E-Print Network [OSTI]

    considered high risk for possible theft and illegal use by terrorists, illegal drug manufacturers or other

  13. Characterization of the Relations between InformationTheoretic Nonmalleability, Secrecy,

    E-Print Network [OSTI]

    tampered with, that it really comes from who it claims. Wegman and Carter's seminal work [2] is considered

  14. Method of intrinsic marking

    DOE Patents [OSTI]

    Adams, David P; McDonald, Joel Patrick; Jared, Bradley Howell; Hodges, V. Carter; Hirschfeld, Deidre; Blair, Dianna S

    2014-04-01T23:59:59.000Z

    A method of pulsed laser intrinsic marking can provide a unique identifier to detect tampering or counterfeiting.

  15. If Louis Pasteur was correct that chance favors the prepared mind, then it found the perfect candidate in Edward Norton Lorenz, MIT mathematician and meteorologist and father of chaos theory, a science many now

    E-Print Network [OSTI]

    Sprott, Julien Clinton

    tampering with with cli- mate's atmospheric gases, the melting its glaciers and ice caps and the resultant

  16. Integrating Automation Design Information with XML and Web Services Mika Viinikkala

    E-Print Network [OSTI]

    Integrating Automation Design Information with XML and Web Services Mika Viinikkala Tampere University of Technology, Institute of Automation and Control, P.O. Box 692, 33101 Tampere Tel. +358 3 3115, Institute of Automation and Control, P.O. Box 692, 33101 Tampere Tel. +358 3 3115 3557, Fax. +358 3 3115

  17. Information flow control for secure web sites

    E-Print Network [OSTI]

    Krohn, Maxwell N. (Maxwell Norman)

    2008-01-01T23:59:59.000Z

    Sometimes Web sites fail in the worst ways. They can reveal private data that can never be retracted [60, 72, 78, 79]. Or they can succumb to vandalism, and subsequently show corrupt data to users [27]. Blame can fall on ...

  18. February 17, 2010 Kosovo and the Neighborhood: Two Years After

    E-Print Network [OSTI]

    Qian, Ning

    's Serbs. There were fears of a Balkan crisis of enormous proportions," noted Grigor'ev, pointing out. "Hotels in Serbia are lousy but the streets were worse." Looters vandalized Western businesses and mobbed

  19. POSTGRADUATE MONTEREY, CALIFORNIA

    E-Print Network [OSTI]

    Identity Theft Prevention, Computer Security, Information Assurance, Social Engineering, CyberNAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution COVERED Master's Thesis 4. TITLE AND SUBTITLE: Title (Mix case letters) Identity Theft Prevention in Cyber

  20. Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web

    E-Print Network [OSTI]

    Tomkins, Andrew

    or keylogging, while cookie theft happens through man-in-the-browser malware (e.g., Zeus [16]), cross site

  1. How the Drudgery of Getting Water Shapes Women's Lives in Low-income Urban Communities

    E-Print Network [OSTI]

    Crow, Ben D; McPike, Jamie

    2009-01-01T23:59:59.000Z

    supply practices: rainwater harvesting, water theft, gifts/to water, in this case from roof rainwater harvesting tanks.

  2. PSI # Date Time Location Incident Description Disposition 5340 8/1/2013 21:03 Deep Green Dorm Theft By Unlawful Taking Scrap metal stolen from dumpster behind new dorm construction BPD Notified

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    By Unlawful Taking Scrap metal stolen from dumpster behind new dorm construction BPD Notified 5341 8/2/2013 17 Taking Coins found missing from jar in apartment Report Filed 5346 8/9/2013 5:30 Industrial Arts Fire

  3. TEXIN2: a model for predicting carbon monoxide concentrations near intersections

    E-Print Network [OSTI]

    Korpics, J. J

    1985-01-01T23:59:59.000Z

    , tampering effects and anti-tampering and inspection/maintenance programs. The TEXIN2 model was compared to experimental data near intersections and to corresponding simulations by TEXIN and other existing intersection models. The revised model also... several new capabilities such as T-intersections, one way streets, and four way stops. Other new options include inspection/maintenance capabilities, provision for anti-tampering programs, and a "short-cut" emissions estimate. Finally, the TEXIN...

  4. Microsoft Word - 2013 IWD #3155 Trident Target Area Operations...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Bounding Conditions Specify preventive measures, controls for each hazard (e.g., lockouttagout points, specific Personal Protective Equipment PPE, Tamper Indicating...

  5. Case School of Engineering San Diego Programs HARDWARE SECURITY

    E-Print Network [OSTI]

    Rollins, Andrew M.

    : A Survey 6. Secure Hardware IPs by Digital Watermark 7. Physical Attacks, Tamper standards. Cheating includes copying from another's work, falsifying problem solutions or laboratory reports

  6. INTEGRATING AUTOMATION DESIGN INFORMATION WITH XML

    E-Print Network [OSTI]

    INTEGRATING AUTOMATION DESIGN INFORMATION WITH XML Mika Viinikkala, Seppo Kuikka Institute of Automation and Control, Tampere University of Technology, P.O. Box 692, 33101 Tampere, Finland Email: mika.viinikkala@tut.fi, seppo.kuikka@tut.fi Keywords: Systems integration, XML, automation design Abstract: This paper presents

  7. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  8. Mobile and Interactive Social Television A Virtual TV Room Francesco Cricri

    E-Print Network [OSTI]

    Gabbouj, Moncef

    .curcio@nokia.com Moncef Gabbouj Tampere University of Technology Tampere, Finland moncef.gabbouj@tut.fi Abstract Smart on the market. People often prefer to watch TV programs, such as a football game or a movie, together with other be located in a relatively restricted geographical area, in order to be able to meet each other at home

  9. Preventing Fraud Following a Disaster 

    E-Print Network [OSTI]

    Cavanagh, Joyce

    2005-10-11T23:59:59.000Z

    After a natural disaster, people may be susceptible to price gouging, home repair fraud and identity theft. This publication explains how to protect yourself from these problems....

  10. Unaccounted-for gas project: Summary volume. Energy delivery and control. Final report

    SciTech Connect (OSTI)

    Cima, K.M.; Cottengim, T.L.; Wong, R.M.; Cowgill, R.M.; Grinstead, J.R.

    1990-06-01T23:59:59.000Z

    The study was aimed at determining unaccounted-for (UAF) gas volumes resulting from operating Pacific Gas and Electric Co.'s transmission and distribution systems during 1987. The Theft Task Force analyzed the percentage of customers involved in gas theft, the average annual volume of gas stolen by a single customer, and the total number of customers and their total gas usage. Results were used in conjunction with documented customer theft to arrive at a calculation that more accurately reflected the theft contribution to UAF for 1987.

  11. U.S DEPARTMENT OF ENERGY EMPLOYEE PERSONAL PROPERTY REMOVAL AUTHORIZAT...

    Office of Environmental Management (EM)

    I understand that DOE is not responsible nor financially liable for loss, theft, damage or destruction of employee's personal property brought into DOE's facilities....

  12. Preventing Fraud Following a Disaster

    E-Print Network [OSTI]

    Cavanagh, Joyce

    2005-10-11T23:59:59.000Z

    After a natural disaster, people may be susceptible to price gouging, home repair fraud and identity theft. This publication explains how to protect yourself from these problems....

  13. The Front Burner Cybersecurity The ACIO for Cybersecurity

    Broader source: Energy.gov (indexed) [DOE]

    all of its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. No country, industry, community, or individual is immune to cyber risks. National...

  14. Introduction of First Passage Time (FPT) Analysis for Software Reliability and Network Security

    E-Print Network [OSTI]

    Krings, Axel W.

    Zhanshan (Sam) Ma Axel W. Krings Richard C. Millar ma@vandals.uidaho.edu krings@uidaho.edu rcmillar mostly emerged in the last two to three decades. Assuming that X(t) is a one-dimensional stochastic stochastic process such as Brownian motion, then the FPT approach may be applied to find the closed- form

  15. Effect of sampling height on the concentration of airborne fungal spores

    E-Print Network [OSTI]

    Levetin, Estelle

    and possible sources of air pollution.8 In addition, it is high enough to avoid vandalism and bothering aeroallergens. Airborne fungal spores are commonly collected from the outdoor air at the rooftop level of high respiration level (1.5 m above the ground) and at roof level (12 m height). Methods: Air samples were

  16. PSI # Date Time Location Incident Description Disposition 4314 8/2/2011 13:40 Agriculture Parking Lot Criminal Damage Spark plug cables cut on pick-up truck Report on file

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    :48 Boone Tavern Parking Lot Property Damage Mitsubishi Gallant Report on file 4318 8/10/2011 19:10 Anna Smith Parking Lot Theft by Unlawful Taking Car battery and Jumper Cables Report on file 4319 8 responded 4321 8/14/2011 17:14 Evans Sports Complex Theft by Unlawful Taking Solar Panel and Mounting

  17. 10850 Federal Register / Vol. 71, No. 42 / Friday, March 3, 2006 / Rules and Regulations number of registered vehicles. In the

    E-Print Network [OSTI]

    of registered vehicles. In the United States, there are over 230,000,000 registered vehicles. In 2005, about 12,700 vehicles were imported into the U.S. by RIs. Approximately 99 percent of the imported vehicles vehicles have not been high theft line vehicles subject to the Theft Prevention Standard. Of those

  18. 1284 IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 26, NO. 2, APRIL 2011 Improving SVM-Based Nontechnical Loss Detection in Power Utility Using

    E-Print Network [OSTI]

    Ducatelle, Frederick

    classification. I. INTRODUCTION DISTRIBUTON losses in power utilities originating from electricity theft-Based Nontechnical Loss Detection in Power Utility Using the Fuzzy Inference System Jawad Nagi, Keem Siah Yap, Sieh of fraud and electricity theft in power distribution utilities. Pre- vious work was carried out by using

  19. In Nevada, during 2008, about 16,000 motor vehicles were stolen.

    E-Print Network [OSTI]

    Hemmers, Oliver

    vehicles were stolen in 2008, totaling over $6 billion in losses (FBI, 2008). Efforts to control motor brief describes the patterns of motor vehicle theft in Nevada and compares them to national trends are also discussed. The Prevalence of Motor Vehicle Theft Although the general trend is downward, since

  20. 316 Maxwell Rd., Suite 100 Alpharetta, GA 30009

    E-Print Network [OSTI]

    ,000+value $ $ $ List below only jewelry, musical instruments, bikes or fine art that are valued over $2 coverages, credits and options may vary by state. identity theft expense coverage: Exclusive Benefit from coverage identity theft expense coverage at no extra cost. You will retain this coverage as long as your

  1. How can you review & monitor your personal information?

    E-Print Network [OSTI]

    Mahon, Bradford Z.

    your accounts each month and access your credit report regularly. This will allow you to take actions against such crimes is to keep personal details private and safe, to avoid becoming a victim. How does Identity Theft happen? Identity theft is possible when a criminal obtains your personal information

  2. Forestland can provide countless hours of recreation-al benefits as well as an important source of income.

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    . As a result, many private landowners do not realize that timber theft is a severe problem which could affect There are two legal approaches to dealing with timber theft: criminal and civil. Thanks to recent legislation in Virginia, pursuing these legal remedies has become somewhat easier for landowners. Criminal Remedies While

  3. HH MM SS && HH SS DD MM EMERGENCY GUIDE

    E-Print Network [OSTI]

    Yellen, Gary

    for Emergencies 3. Injury/Illness 4. Fire/Smoke/Explosion 5. Utility Disruption 6. Threat 8. Suspicious Package · Theft HMS/HSDM Facilities Office (617) 432-1901 · Fire/Smoke/Explosion · Flooding · Hazardous Material Safety · Threat · Violence · Theft HMS/HSDM Facilities Office (617) 432-1901 · Fire/Smoke/Explosion

  4. A Novel Hardware Logic Encryption Technique for thwarting Illegal Overproduction

    E-Print Network [OSTI]

    Boyer, Edmond

    A Novel Hardware Logic Encryption Technique for thwarting Illegal Overproduction and Hardware. The different types of threats include mask theft, illegal overproduction, as well as the insertion of malicious of the manufactured ICs. One way to protect the ICs from mask theft and illegal overproduction is to encrypt

  5. TABLE OF CONTENTS Introduction 1

    E-Print Network [OSTI]

    , dishwashing machine and water heater. Stop operating until power is restored. Write down the time of onset Lesson 3 Fire 4 Lesson 4 Water service disruption or contamination 5 Lesson 5 Biological tampering

  6. Exposures Information Totals Calls

    E-Print Network [OSTI]

    Oliver, Douglas L.

    0.9 0.8 Other Contamination / tampering 0.6 0.8 Malicious 0.4 0.4 Withdrawal 0.1 0.1 Adverse antagonists Anticonvulsants GI preparations Electrolytes and minerals Dietary supp

  7. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  8. The Future of Injection Molding in Food Packaging for the United States

    E-Print Network [OSTI]

    Meissbach, Kenneth

    2005-05-20T23:59:59.000Z

    threaten the future of injection molding. Continued development of materials, and processing equipment as well as the use of in mold labeling and integrated tamper evident packaging are opportunities for injection molding. The environmental issues...

  9. Investigation of Natural Product Scaffolds for the Development of Opioid Receptor Ligands

    E-Print Network [OSTI]

    Smith, Katherine Marie

    2012-08-31T23:59:59.000Z

    to invade their labs, tamper with their equipment, and teaching me some pharmacology along the way. Because of your influence, I am a better medicinal chemist and a better scientist. Additional thanks to Dr. Navarro and his group for performing...

  10. HIGHER EDUCATION OPPORTUNITY ACT REPORTING University of Delaware

    E-Print Network [OSTI]

    Firestone, Jeremy

    ;HIGHER EDUCATION OPPORTUNITY ACT REPORTING D. Policies on portable electrical appliances, smoking outages of heat). E. Use of extension cords. F. Tampering with or blocking any fire protection equipment

  11. Alternative Fuels Data Center

    Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

    Vehicle Conversion It is unlawful to tamper with vehicle emissions control systems unless the action is for the purpose of converting a motor vehicle to operate on an alternative...

  12. Liquefaction characteristics of a fine sand

    E-Print Network [OSTI]

    Brandon, Donald Timothy

    1974-01-01T23:59:59.000Z

    of Test Apparatus Split&lug Mold and Tamper 29 33 13 15 16 17 18 Sample Compaction . Assembling Triaxial Chamber . Calibration of Triaxial Chamber . Calibration of Pressure Transducer Sample at the Beginning of Axial Loading Typical... TRIAXIAL TEST PROCEDURE Sam le Pre aration The triaxial test specimens were molded by using a hand tamper and compaction mold, both of' which differed with the type of material being used. A specially built mold was used for those samples made...

  13. Enlightened shelf awareness

    E-Print Network [OSTI]

    Ehrenberg, Isaac M

    2009-01-01T23:59:59.000Z

    The use of RFID technology in libraries has increased to the point where it is now the centerpiece of emerging automated self-checkout, return, and theft detection systems. With the external borders of the library secure, ...

  14. Mitigating container security risk using real-time monitoring with active Radio Frequency Identification and sensors

    E-Print Network [OSTI]

    Schlesinger, Adam Ian

    2005-01-01T23:59:59.000Z

    The global village in which we live enables increased trade and commerce across regions but also brings a complicated new set of challenges such as terrorist activity, human and drug smuggling and theft in foreign or ...

  15. Will they buy?

    E-Print Network [OSTI]

    Kubat, Rony Daniel

    2012-01-01T23:59:59.000Z

    The proliferation of inexpensive video recording hardware and enormous storage capacity has enabled the collection of retail customer behavior at an unprecedented scale. The vast majority of this data is used for theft ...

  16. BOSTON UNIVERSITY Policy BU-100-001

    E-Print Network [OSTI]

    Guenther, Frank

    to extreme heat or cold or other potentially harmful environmental conditions. Protect the equipment from theft. 2.5.3. For policies regarding remote access to Boston University's information resources, see Remote Access Policy [BU 100-001A]. #12;

  17. Development of the fundamental attributes and inputs for proliferation resistance assessments of nuclear fuel cycles 

    E-Print Network [OSTI]

    Giannangeli, Donald D. J., III

    2007-09-17T23:59:59.000Z

    threats such as theft or terrorism to future work. A new approach is presented that assesses the problem through four stages of proliferation: the diversion of nuclear material, the transportation of nuclear material from an internationally safeguarded...

  18. Christina Gonzales Dean of Students

    E-Print Network [OSTI]

    Stowell, Michael

    · Facilitating Academic Dishonesty #12;Academic Misconduct · Internet plagiarism is a growing concern on all check disclosure #12;Common Violations · Alcohol Enforced on & off campus · Marijuana & other drugs Drug free act · Theft · Trespassing · Brawling #12;Marijuana · Amendment 64 legalized marijuana

  19. phone 206.543.6486 fax 206.543.3808

    E-Print Network [OSTI]

    Yetisgen-Yildiz, Meliha

    Insurance coverage disputes Non-injury car or bike accidents ENHANCING JUSTICE Top 10 Financial Issues for UW Students 1. Identity theft 2. Misleading sales practices 3. Scams and fraud 4. Internet sales

  20. What can the Campus Police do for you? If you are the victim of an act of violence

    E-Print Network [OSTI]

    Boonstra, Rudy

    also becoming a victim of Identity Theft. Provide crime prevention advice to assist you in not being Grant Alcohol and Drug Awareness Anti-Graffiti Program Bike Patrol Emergency Phones Battery Booster Lone

  1. Building practical systems that compute on encrypted data

    E-Print Network [OSTI]

    Popa, Raluca Ada

    2014-01-01T23:59:59.000Z

    Theft of confidential data is prevalent. In most applications, confidential data is stored at servers. Thus, existing systems naturally try to prevent adversaries from compromising these servers. However, experience has ...

  2. Page 1 of 17 Vehicle Operation and

    E-Print Network [OSTI]

    for any damage to or theft of vehicles or any articles left therein, while parked on CSM property of parking privileges on the CSM campus for a minimum of one (1) full academic semester, and may also result

  3. Characterizing pervasive vehicular access to the cellular RAN infrastructure: an urban case study

    E-Print Network [OSTI]

    Fiore, Marco

    features of pervasive vehicular access in a case- study large-scale urban environment, in presence] and distant support for safety, diagnostic and anti-theft services (e.g., BMW Assist, Ford SYNC, General Motor

  4. SPRING 2013 MOVE-OUT INFORMATION TO: Yudof Residents

    E-Print Network [OSTI]

    Blanchette, Robert A.

    Sharon Roberson ­ Business Operations Supervisor Gary McLean ­ Facilities Operations Supervisor DATE of abandoned bikes. #12;THEFT: With so many unknown people in the building who are here to help, it is also

  5. A review of "The Reformation of the Landscape: Religion, Identity, & Memory in Early Modern Britain and Ireland" by Alexandra Walsham

    E-Print Network [OSTI]

    Jordan, Nicolle

    2012-01-01T23:59:59.000Z

    says, provides ?evidence of the agency of ordinary people in cleansing their land of abominable idols? (137). #22; e zeal of the New Model Army extended even beyond church property, when soldiers saw #23; t to vandalize mysterious geological sites... histories. Her book occasionally falters when the litany of examples loses any manifest connection to landscape, par- ticularly because questions of aesthetics rarely factor into her analysis. Granted, speci#23; c meanings located in or imposed upon...

  6. Volume 70, Numbers 3 & 4 (complete)

    E-Print Network [OSTI]

    Dickson, Donald

    2012-01-01T23:59:59.000Z

    says, provides ?evidence of the agency of ordinary people in cleansing their land of abominable idols? (137). #22; e zeal of the New Model Army extended even beyond church property, when soldiers saw #23; t to vandalize mysterious geological sites... histories. Her book occasionally falters when the litany of examples loses any manifest connection to landscape, par- ticularly because questions of aesthetics rarely factor into her analysis. Granted, speci#23; c meanings located in or imposed upon...

  7. Feasibility of suspension culture of oysters at an offshore site on the Texas coast

    E-Print Network [OSTI]

    Ogle, John Thomas

    1975-01-01T23:59:59.000Z

    depleted due to death and vandalism, depriving the 20- month experiment of a control. It was decided to retain the oysters at the offshore station to follow survival and to initiate another experiment. As oyster numbers offshore had declined...FEASIBILITY OF SUSPENSION CULTURE OF OYSTERS AT AN OFFSHORE SITE ON THE TEXAS COAST A Thesis by JOHN THOMAS OGLE Submitted to the Graduate College of Texas A&M University in partial fulfillment of the requirement for the degree of MASTER...

  8. Known Index per Known Index per Known Index per Offenses 100,000 Offenses 100,000 Offenses 100,000

    E-Print Network [OSTI]

    Embezzlement 0 0 0 0 0 0 Stolen Prop., Rec., Possess., Buying 0 0 0 0 0 0 Vandalism 0 0 1 26 0 0 Weapons Other dangerous weapon 0 0 0 0 0 0 Strong arm (hands, feet, etc.) 0 1 26 0 0 Assault (total) 2 56 1 26 0 0 Firearm 0 0 0 0 0 0 Knife or cutting instrument 0 0 0 0 0 0 Other dangerous weapon 0 0 0 0 0 0

  9. Known Index per Known Index per Known Index per Offenses 100,000 Offenses 100,000 Offenses 100,000

    E-Print Network [OSTI]

    Stolen Prop., Rec., Possess., Buying 0 0 0 0 0 0 Vandalism 70 390 62 319 63 324 Weapons, Carrying 0 3 15 5 26 Other dangerous weapon 1 6 3 15 0 0 Strong arm (hands, feet, etc.) 4 22 13 67 11 57 Other dangerous weapon 6 33 6 31 0 0 Strong arm (hands, feet, etc.) 7 39 8 41 12 62 Other assaults

  10. Known Index per Known Index per Known Index per Offenses 100,000 Offenses 100,000 Offenses 100,000

    E-Print Network [OSTI]

    0 0 0 Stolen Prop., Rec., Possess., Buying 0 0 0 0 0 0 Vandalism 1 49 3 152 0 0 Weapons, Carrying Other dangerous weapon 0 0 0 0 0 0 Strong arm (hands, feet, etc.) 1 49 2 101 0 0 Assault (total) 0 0 0 0 0 0 Firearm 0 0 0 0 0 0 Knife or cutting instrument 0 0 0 0 0 0 Other dangerous weapon 0 0 0 0 0 0

  11. Three Essays In Applied Microeconometrics

    E-Print Network [OSTI]

    Cheng, Cheng

    2014-06-02T23:59:59.000Z

    III.3 Falsification Tests: The Effect of Castle Doctrine on Larceny and Motor Vehicle Theft ...............................................................................................................................57 III.4 The Deterrence Effects.... In addition, I find castle doctrine laws also pass placebo tests since they do not affect crimes that are not supposed to be deterred by the laws, such as vehicle theft and larceny. In the third paper, I estimate the effect of China’s marriage and divorce...

  12. Being Proactive to Increasing Supply Chain Security Challenges: A Quantitative and Qualitative Approach

    E-Print Network [OSTI]

    Lu, Guanyi

    2013-07-24T23:59:59.000Z

    performance, supply chain security (SCS) breaches are largely ignored (Martens et al., 2011; Williams et al., 2008). The neglect of SCS breaches makes the understanding of supply chain risk incomplete at best: theft alone costs retailers and consumers $104... of SCS has gone beyond simply preventing theft or other illegal access to supply chain assets to protecting the supply chain from any illicit use (e.g., smuggling weapons of mass destruction, counterfeit products, adulterated drugs) that could cause...

  13. Modeling threat assessments of water supply systems using markov latent effects methodology.

    SciTech Connect (OSTI)

    Silva, Consuelo Juanita

    2006-12-01T23:59:59.000Z

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  14. Improved Security Via ''Town Crier'' Monitoring

    SciTech Connect (OSTI)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, A. N.

    2003-02-26T23:59:59.000Z

    Waste managers are increasingly expected to provide good security for the hazardous materials they marshal. Good security requires, among other things, effective tamper and intrusion detection. We have developed and demonstrated a new method for tamper and intrusion detection which we call the ''town crier method''. It avoids many of the problems and vulnerabilities associated with traditional approaches, and has significant advantages for hazardous waste transport. We constructed two rudimentary town crier prototype systems, and tested them for monitoring cargo inside a truck. Preliminary results are encouraging.

  15. Improved security via 'Town Crier' monitoring

    SciTech Connect (OSTI)

    Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.)

    2002-01-01T23:59:59.000Z

    Waste managers are increasingly expected to provide good security for the hazardous materials they marshal. Good security requires, among other things, effective tamper and intrusion detection. We have developed and demonstrated a new method for tamper and intrusion detection which we call the 'town crier' method. It avoids many of the problems and vulnerabilities associated with traditional approaches, and has significant advantages for hazardous waste transport. We constructed two rudimentary town crier prototype systems, and tested them for monitoring cargo inside a truck. Preliminary results are encouraging.

  16. 1How Many Lightbulbs to Change a Tester? Copyright 2003 Cem Kaner The Past & Future of Software Testing

    E-Print Network [OSTI]

    the Education of Software Testers." Any opinions, findings and conclusions or recommendations expressed1How Many Lightbulbs to Change a Tester? Copyright © 2003 Cem Kaner The Past & Future of Software.kaner.com, www.testingeducation.org at the Software Testing Day Tampere University of Technology May 4, 2004

  17. December 2009 Uses of RFID Technology in U.S.

    E-Print Network [OSTI]

    McShea, Daniel W.

    , along with integrated entry and exit data systems and requirements for tamper-resistant, machine 9/11, the U.S. Congress passed the Enhanced Border Security and Visa Entry Reform Act of 2002 Security and Visa Entry Reform Act of 2002 set a new standard by establishing interoperability standards

  18. Approved by Principal Investigator_____________________________Date:________________ Approved by Super User: _____________________________Date:________________

    E-Print Network [OSTI]

    Healy, Kevin Edward

    inside the RIE system chassis. In addition, the external RF power supply unit has connections behind the RF power supply chassis. Do not disconnect the external RF lines. Use normal precautions C. Chemical: Bottled gases are used with the RIE. Do not disconnect or tamper with gas lines behind

  19. Approved by BNC Managing Director______Paul Lum___________Date:________________ Approved by PI (s) /Super User (s): _Peter Hosemann/Andy Minor_Date:________________

    E-Print Network [OSTI]

    Healy, Kevin Edward

    inside the FEG/FIB system chassis. In addition, the power supply unit has connections behind the FEG) connections behind the FEG/FIB chassis. C. Chemical: Bottled gases are used with the FEG/FIB. Do not disconnect or tamper with gas lines on the FIB. D. Pressure Hazards: Pressurized bottled and house gases

  20. Project 93L-EWL-097, fire alarm system improvements, 300 Area

    SciTech Connect (OSTI)

    Scott, M.V.

    1995-01-01T23:59:59.000Z

    This document contains the Acceptance Test Procedure (ATP) which will demonstrate that the modifications to the Fire Protection systems in the 338 Building function as intended. The ATP will test the fire alarm control panel, flow alarm pressure switch, post indicator valve tamper switch, heat detectors, flow switches, and fire alarm signaling devices.

  1. Proliferation J.A.Parmentola

    E-Print Network [OSTI]

    Gilfoyle, Jerry

    ­stage, thermonuclear weapon. Plutonium Uranium Tamper Fusion Fuel High Explosive Plutonium Primary Secondary #15; High, the fusion fuel (containing deuterium and 6 Li), and the remaining pluto­ nium. The uranium and plutonium `burn' and increase the temperature until fusion occurs. #15; The energy released by the fusion reaction

  2. Energy and Environment Programme, Royal Institute of International Affairs 1 Intergovernmental Actions on

    E-Print Network [OSTI]

    Actions on Illegal Logging Forest Law Enforcement and Governance Conference, 11 September 2001 Duncan all along chain of custody (logging, processing, export) ­ need for: · Accredited certifiers (government, NGO, company) · Independent monitoring · Tamper-proof accompanying documentation/ information

  3. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  4. Phoneme-dependent NMF for speech enhancement in monaural mixtures Bhiksha Raj1

    E-Print Network [OSTI]

    Virtanen, Tuomas

    Phoneme-dependent NMF for speech enhancement in monaural mixtures Bhiksha Raj1 , Rita Singh1, over conventional NMF-based separation. Index terms: Monaural signal separation, speech enhance- ment, Tampere, Finland. Abstract The problem of separating speech signals out of monaural mix- tures (with other

  5. Expressive Declassification Policies and Modular Static Enforcement Anindya Banerjee

    E-Print Network [OSTI]

    Banerjee, Anindya

    to tampering. But it is usually impractical to process data in encrypted form. Access controls regulate actions by which data is manipulated. Access control mechanisms can often be implemented effi- ciently and access to direct access. Information flow controls address the manipulation of information once data has been

  6. Semi-BlindImage Restoration Based on TelltaleWatermarking Deepa Kundur and DimitriosHatzinakos

    E-Print Network [OSTI]

    Kundur, Deepa

    in the embedded stream. The altered stream is used for semi-blind restoration to undo tampering. It is assumedSemi-BlindImage Restoration Based on TelltaleWatermarking ~ AUTHENTIC IMAGE Deepa Kundur the restorationof locally degraded images based on telltalefragilewatermarking. In our approach a data stream culled

  7. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  8. HIGHER EDUCATION OPPORTUNITY ACT REPORTING University of Delaware

    E-Print Network [OSTI]

    Firestone, Jeremy

    /17/13@ 2:15pm Unattended electric fan left on upholstered chair 0 0 $400 Warner Hall Attic 4/20/13@ 4:47am on portable electrical appliances, smoking and open flames: On campus housing facilities have prohibitions by Residential Facilities for emergency outages of heat). E. Use of extension cords. F. Tampering

  9. Dynamic Traitor Tracing Amos Fiat 1,2 and Tamir Tassa 2

    E-Print Network [OSTI]

    Tassa, Tamir

    , watermarking, imprinting, pay TV, on­line algorithms. 1 Introduction The subject of this paper is protecting. Pirates make a business of breaking the security safeguards of the conditional access system and sell on tamper resistant devices, most notably di#erential power analysis and timing attacks [6], have

  10. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  11. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  12. Memory-centric Security Architecture Weidong Shi Chenghuai Lu Hsien-Hsin S. Lee

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    of Computing School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 30332- loads and cycle based out-of-order processor simulation. 1 Introduction Recently, there is a growing interest in creating tamper-resistant/copy protection systems that combine the strengths of security

  13. A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems

    E-Print Network [OSTI]

    Baras, John S.

    have nothing to say about the quality of the data obtained from various substations. Nor does unattended in physically insecure environments, and are designed with an emphasis on numbers and low cost which makes security measures such as tamper-proof hardware not cost effective. Therefore, we cannot

  14. 112 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 1, JANUARY 2012 A Novel Technique for Improving Hardware Trojan

    E-Print Network [OSTI]

    Plusquellic, James

    about tampering with inserting hardware Trojans in an integrated circuit supply chain in recent years in integrated circuit (IC) market due to eco- nomical profit, with limiting the control of customer over IC112 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 1, JANUARY 2012

  15. 2009 No part may be reproduced in any form without prior authorization.

    E-Print Network [OSTI]

    Amin, S. Massoud

    /Tamper Detection 3. Comm. Protocol Security 4. Risk Mgmt. Enhancement 5. High Speed Encryption 1. Self Healing Grid without prior authorization. Goal: Optimize controls to compensate for damage or failure conditions prior authorization. Intelligent Flight Control System: Example ­ complete hydraulic failure (1997) #12

  16. Insider Attacker Detection in Wireless Sensor Fang Liu & Xiuzhen Cheng

    E-Print Network [OSTI]

    Cheng, Xiuzhen "Susan"

    to be low-cost and lack of tamper resistance. The compromise or capture of a sensor releases all the intrusion detection techniques developed for a fixed wired network. A typical low-cost sensor has limited working towards securing sensor networks in the fields of pairwise key establishment [13

  17. Process Assessment In Very Small Entities An ISO/IEC 29110 based method

    E-Print Network [OSTI]

    Québec, Université du

    Process Assessment In Very Small Entities An ISO/IEC 29110 based method Timo Varkoi Tampere entities I. INTRODUCTION A new standard, ISO/IEC 29110 Software Engineering -- Lifecycle Profiles for Very. ISO/IEC 29110 Guides (TR) Assessment Guide (TR 29110-3) Management and Engineering Guide (TR 29110

  18. 4610SW IP Telephone Release 2.0

    E-Print Network [OSTI]

    and you need technical assistance or support, in the United States and Canada, call the Technical Service as harmful tampering, data loss or alteration, regardless of motive or intent) Be aware that there may realize that, if such an intrusion should occur, it could result in a variety of losses to your company

  19. Annals of Telecoms. Volume X n X/2005, pages 1 X Data confidentiality: to which extent

    E-Print Network [OSTI]

    be accessed by an unauthorized person or program. The integrity property guarantees that the data cannot management is performed on the server, relying on the assumption that the server is a trusted party. However. KEYWORDS: data confidentiality, access control management, data encryption, integrity control, tamper

  20. Annals of Telecoms. Volume X n X/2005, pages 1 X Data confidentiality: to which extent

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    data can never be accessed by an unauthorized person or program. The integrity property guarantees management is performed on the server, relying on the assumption that the server is a trusted party. However. KEYWORDS: data confidentiality, access control management, data encryption, integrity control, tamper

  1. Security of the Europena Electricity Systems: Conceptualizing the ssessment Criteria and Core Indicators

    E-Print Network [OSTI]

    Jamasb, Tooraj Nepal, Rabindra

    2012-12-10T23:59:59.000Z

     external  events can be natural (such as natural calamities and severe weather conditions),  accidental  (such  as  explosions  and  nuclear  accidents)  or  human?engineered  malicious  threats  (such  as  terrorist  attacks,  sabotage  and  vandalism  and...  of the threats being natural, accidental or human?tailored.   2    1223  across  the UK,  Italy,  and North America  (Bompard et al., 2011)2.  In addition,  the  economic damages due to Japanese power failures in March 2011 in Fukushima in  the  wake  of  an  earthquake  and  subsequent  tsunami  underscore...

  2. The HIPROTECT system

    SciTech Connect (OSTI)

    Baker, J.; Modlin, C.W.; Frerking, C.J.

    1993-10-10T23:59:59.000Z

    HIPROTECT (pronounced High-protect) is a system designed to protect national archaeological and natural treasures from destruction by vandals or looters. The system is being developed jointly by the Lawrence Livermore National Laboratory and the University of California at Riverside under the DOD Legacy Resource Management Program. Thousands of archaeological sites are located on military bases and national park lands. Treasure hunters or vandals are pillaging and destroying these sites at will, since the sites are generally located in remote areas, unattended and unprotected. The HIPROTECT system is designed to detect trespassers at the protected sites and to alert park officials or military officials of intrusions. An array of sensors is used to detect trespassers. The sensors are triggered when a person or vehicle approaches the site. Alarm messages are transmitted to alert park officials or law enforcement officials by way of a cellular telephone link. A video and audio system is included to assist the officials in verifying that an intrusion has occurred and to allow two-way communication with the intruders.

  3. New Tool for Proliferation Resistance Evaluation Applied to Uranium and Thorium Fueled Fast Reactor Fuel Cycles

    E-Print Network [OSTI]

    Metcalf, Richard R.

    2010-07-14T23:59:59.000Z

    reactor cycle and one scenario involves theft from a PUREX facility in a LWR cycle. The FBRFC was evaluated with uranium-plutonium fuel and a second time using thorium-uranium fuel. These diversion scenarios were tested with both uniform and expert weights...

  4. Privacy Engineering Objectives and Risk Model-Discussion Deck

    E-Print Network [OSTI]

    , Regulation, FIPPs, etc.) Risk Requirements System Evaluation SeptemberWorkshop #12;Privacy Engineering of self-determination, loss of trust, discrimination and economic loss by providing predictability. · Economic Loss: Economic loss can include direct financial losses as the result of identity theft, as well

  5. We've found an error in our paper. In the threshold signature scheme that we used, there are restrictions on the threshold value. In particular if the key is shared over a degree t polynomial, then 2t+1 players (not t+1)

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    and will be updating the paper accordingly. Securing Bitcoin wallets via threshold signatures Steven Goldfeder stevenag@cs.princeton.edu Arvind Narayanan arvindn@cs.princeton.edu ABSTRACT The Bitcoin ecosystem has suffered frequent thefts serious. Due to the irre- versibility, automation, and pseudonymity of transactions, Bitcoin currently

  6. UNIVERSITY POLICE DEPARTMENT Interoffice Memorandum 12-054

    E-Print Network [OSTI]

    Ponce, V. Miguel

    : The following meeting/events (s) were attended: Projects Meeting at Facilities Services Simplex Integration Robbery 0 0 0 8 Assault 2 0 2 28 Burglary 5 0 5 36 Larceny 16 0 16 249 Motor Vehicle Theft 1 0 1 8 Total

  7. SIP-based VoIP Traffic Behavior Profiling and Its Applications

    E-Print Network [OSTI]

    Zhang, Zhi-Li

    calls over the Internet, or any other IP network, using the packet switched network as a transmission maximize network efficiency, stream- line the network architecture, reduce capital and operational Hun such powerful infrastructures also make them a liability. Risks include Denial of Service (DoS), Ser- vice Theft

  8. Impact of orifice metering uncertainties

    SciTech Connect (OSTI)

    Stuart, J.W. (Pacific Gas and Electric Co., San Francisco, CA (USA))

    1990-12-01T23:59:59.000Z

    In a recent utility study, attributed 38% of its unaccounted-for UAF gas to orifice metering uncertainty biasing caused by straightening vanes. How this was determined and how this applied to the company's orifice meters is described. Almost all (97%) of the company's UAF gas was found to be attributed to identifiable accounting procedures, measurement problems, theft and leakage.

  9. Yes, you can control lost and unaccounted-for gas

    SciTech Connect (OSTI)

    Hale, D.

    1984-05-01T23:59:59.000Z

    In 1982, lost and unaccounted-for gas cost the US gas industry $1.983 billion, based on a gas worth of $5.00/1000 CF. A survey of key gas operators across the country produced a list of 23 suggestions for reducing gas losses in the areas of leakage control, measurement practices, accounting accuracy, and theft prevention.

  10. Evolving Strategies for the Prisoner's Dilemma JENNIFER GOLBECK

    E-Print Network [OSTI]

    Golbeck, Jennifer

    and then compared to the performance of the controls. The results presented here strongly indicate behavior from petty theft to nuclear war. Much of the current body of research has focused on which should perform well. My hypothesis is that superior strategies have two traits in common. First, they can

  11. Copyright Siemens Business Services Patient Tracking

    E-Print Network [OSTI]

    Manstein, Dietmar J.

    © Copyright Siemens Business Services Patient Tracking based on RFID labels ThomasThomas JellJell Principal ConsultantPrincipal Consultant DirectorDirector SBS SI 22 #12;2 Siemens One Projects · SBS Companies / Goverment #12;3 Siemens One Projects · Showroom GfM Furniture · Designer Knock Offs ( · Theft

  12. IEEE International Conference on Power and Energy (PECon 08), December 1-3, 2008, Johor Bahru, Malaysia. Abstract--Electricity consumer dishonesty is a problem faced

    E-Print Network [OSTI]

    Ducatelle, Frederick

    , electricity theft, non-technical loss, load profile. I. INTRODUCTION LECTRIC utilities lose large amounts annual revenue [5], which is relatively low when compared to losses faced by electric utilities, Malaysia. Abstract--Electricity consumer dishonesty is a problem faced by all power utilities. Finding

  13. Joshua Rosenthol, CISSP Trends in the Threat Landscape

    E-Print Network [OSTI]

    Joshua Rosenthol, CISSP Trends in the Threat Landscape #12;2 Year in Review Data Theft Targeted-virus, firewalls, and intrusion prevention) are only effective against 30-50% of current security threats. Moreover, customers expect the effectiveness of signature-based security to continue to decline rapidly. IDC Threat

  14. MSU Extension Publication Archive Archive copy of publication, do not use for current recommendations. Up-to-date

    E-Print Network [OSTI]

    to theft, neglect or failure to follow recognized good farming practices. Premiums in each county are based of Agricultural Economics Issued October 1982 6 pages The PDF file was provided courtesy of the Michigan State, Department of Agricultural Economics Figure 1.1982 Michigan FCIC Insurable Crops. (Crop and County) which

  15. GUIDELINES: KEEPING GOOD

    E-Print Network [OSTI]

    Fainman, Yeshaiahu

    GUIDELINES: KEEPING GOOD RESEARCH LAB NOTEBOOKSUC San Diego's Technology Transfer Office (TTO to university policies and guidelines thereby providing incentives for the generation of new innovations and initials. · Consider the possibility of theft, damage, or loss of logbook and take appropriate measure (e

  16. UCF-5.012 Organizational Rules of Conduct Student organizations are expected to abide by these Organizational Rules of Conduct,

    E-Print Network [OSTI]

    Van Stryland, Eric

    UCF-5.012 Organizational Rules of Conduct Student organizations are expected to abide by these Organizational Rules of Conduct, and administrators and faculty are expected to enforce them. These rules should these offenses, constitute violations of the Organizational Rules of Conduct. (1) Theft, Disregard for Property

  17. AT&T Consulting Security Services for Mergers and Acquisitions

    E-Print Network [OSTI]

    Fisher, Kathleen

    . This presents an increasing risk for the security of personally identifiable information entrusted the combined strengths and create a larger economic value. While doing so, overlooking information security Espionage · Misuse of Information · Theft, Fraud Security in the M&A Process Information Security needs

  18. Justification for Acquisition and Use of Broadband Device Request Form

    E-Print Network [OSTI]

    Personal Use of NIH Information Technology (IT) Resources Policy (http://www3.od.nih.gov/oma/manualchapters/management Cellular Activation* AT&T Verizon T-Mobile Provide SIMM Card Number* *GO TO SETTINGS ­ GENERAL country. I will immediately report the loss or theft of my broadband device as outlined in the Managing

  19. Women Prisoners and Recidivism Factors Associated with Re-Arrest One Year Post-Release

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    ranging from aggravated battery to driving without a valid license. Most arrests were for drug possession or retail theft (35% and 34%, respectively), followed by prostitution (19%), and battery (13%). Of those on new charges but cited for violating conditions of parole. Half of all arrestees were sent back

  20. Improvement of the QoS via an Adaptive and Dynamic Distribution of Applications in a Mobile Environment

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    @irisa.fr Anne-Marie Kermarrec Microsoft Research Ltd. St George house 1, Guildhall Street Cambridge CB2 3NH. UK to the battery life limit. - Wireless connections used by PIA suffer from a low and extremely variable bandwidth for battery lifetime reason or hos- tile events such as security problems, theft or destruc- tion. - PIA may

  1. Campus Safety Tips Connect Ed ConnectEd is a service that allows the

    E-Print Network [OSTI]

    de Lijser, Peter

    while on campus, espe- cially in the Library. Use a U-Lock to lock up your bike. Do not give out your personal infor- mation to strangers, you may become a victim of Identity Theft. If you dial 9-1-1 from

  2. Northwestern University Information Technology Your data. Your privacy. Your role.

    E-Print Network [OSTI]

    Shahriar, Selim

    the risk presented by identity theft, and avoid possible criminal and civil action and penalties Network of those actions: Your information -- Protecting your personally identifiable information helps keep it private and out of the hands of identity thieves Safety of our constituents -- Proper handling

  3. Log Design for Accountability Denis Butin, Marcos Chicote and Daniel Le Metayer

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , the logs we examine here record actions by data controllers handling personally identifiable information or identity theft can arise through criminal obtainment of PII. To address these threats, legislation on how safeguards for the private sector and the 1974 Privacy Act [7] does so for government agencies. In practice

  4. Judicial District Attorney's Office in conjunction with Community Partners

    E-Print Network [OSTI]

    fraud prevention, intervention, and victim support. 1st Judicial District - District Attorney Fraud Line, mail theft, dumpster diving and e-mail "phishing." 2. It's a good idea to carry your Social Security member, a financial advisor, or someone with your Power of Attorney who is paying your bills and managing

  5. Virginia State Police www.vsp.virginia.gov Media Release

    E-Print Network [OSTI]

    Virginia Tech

    ) on the Smart Road at Virginia Tech. At the time of the armed robbery, Radford City Police had issued a multi of an abandoned vehicle on the Smart Road on Dec. 8, they immediately notified Radford City Police of its recovery-SUICIDE Radford City Police Link Auto Theft to Gunman BLACKSBURG, Va. ­ Virginia State Police have identified

  6. Abstract--Efficient methods for detecting electricity fraud has been an active research area in recent years. This paper presents

    E-Print Network [OSTI]

    Ducatelle, Frederick

    on abnormal consumption behavior. The proposed approach uses customer load profile information to expose, genetic algorithm, electricity theft, non-technical loss, load profile. I. INTRODUCTION LECTRIC utilities identification and voting scheme [1]. Among these, load profiling is one of the most widely used [9], which

  7. IBM Web Security -Overview Animation With more instrumentation, interconnections

    E-Print Network [OSTI]

    , IBM enables you to not only protect your existing web applications and backend databases, but also, there is the IBM Proventia family of network and host solutions, for real-time ahead of the threat protection at risk, which can lead to identity theft and fraud. #12;Our changing technological landscape demands new

  8. M E M O R A N D U M To: IT Steering Committee

    E-Print Network [OSTI]

    Qiu, Weigang

    to marriage); information in #12;student education records that is protected under the Family Educational with these procedures over the past seventeen months, and your comments. INFORMATION TECHNOLOGY SECURITY PROCEDURES I of this information. Loss of data integrity, theft of data, and unauthorized or inadvertent disclosure could lead

  9. Devorah Heitner, PhD of Raising Digital Natives

    E-Print Network [OSTI]

    Ottino, Julio M.

    issues to discuss with your child. You can create a smart tech culture in your family where you lead for technology to bring your family together. Dr. Heitner will discuss issues such as choosing quality apps, how) Register Protecting Your Money from Cons, Fraud and Identity Fraud Theft With NU Life Matters People from

  10. POLITICALECONOMY RESEARCHINSTITUTE

    E-Print Network [OSTI]

    Mountziaris, T. J.

    in international financial statistics where you can find dirty money or laundered proceeds of flight capital, trade Value recovery of stolen assets is both an enforcement of anti-money laundering laws and a potent weapon; 1. Introduction Money laundering and the predicate crimes of corruption and theft of public assets

  11. SCI-FI NO MORE Restoring sight to

    E-Print Network [OSTI]

    Valero-Cuevas, Francisco

    Bots INVISIBLE CITIES Michelle Povinelli plots solar theft 46 36 26 SPRING 2013 #12;The USC Viterbi SchoolJimCollins'good-to-greatascent: passion, excellence and the resources to fuel them. We have encapsulated the first two in the following

  12. Frequency of and responses to illegal activity related to commerce in firearms: findings from the Firearms

    E-Print Network [OSTI]

    Leistikow, Bruce N.

    Frequency of and responses to illegal activity related to commerce in firearms: findings from Year] doi:10.1136/ injuryprev-2012-040715 ABSTRACT Background Firearms may be obtained illegally from and theft. Some retailers knowingly make illegal sales. Objective To obtain information about the frequency

  13. ONESTEPinthe NIGHT might SAVEyour LIFE

    E-Print Network [OSTI]

    Ejiri, Shinji

    sometimes discourage theft. Period: October 2010 - September 2011 2010 10 2011 9 #12;Say NO to illegal drugs Illegal drugs can ruin your life! Drug dependence can lead to financial troubles and violence, destroying changes. MDMA There are various types of illegal drugs Illegal drugs include amphetamines, marijuana

  14. GuidetoBenefitsImportant information. Please read and save. MasterCard Corporate Payment

    E-Print Network [OSTI]

    Royer, Dana

    -ASSIGNED CARDS) MasterRental is a smart way to save when you rent a vehicle for 31 consecutive days or less) physical damage and theft of the vehicle up to its market value, not to exceed $50,000. (b) reasonable applicable insurance (e.g., home or business), then we'll cover whatever is not covered by your insurance

  15. SUMMER SCHOOL CLASS OF INTEREST --2012 DS 501 Special Topics

    E-Print Network [OSTI]

    Sheridan, Jennifer

    or "Earthships;" light-emitting and energy-harvesting fabrics; the cityscapes and "new neighborhoods and environmental problems (e.g., overwhelming waste, toxicity, inequities from globalization). Twenty-first century to generating and transporting light, conceiving of and manufacturing clothing, cleaning water, preventing theft

  16. November 2007 USING STORAGE ENCRYPTION

    E-Print Network [OSTI]

    user devices, such as personal computers, portable electronic devices, and removable storage media in disruption, identity theft, and other fraud. End user devices, such as personal computers, portable the confidentiality of the information stored on the devices and enable unauthorized persons to gain access

  17. UNIVERSITY OF CALIFORNIA ACADEMIC SENATE, IRVINE DIVISION Council on Student Experience

    E-Print Network [OSTI]

    Rose, Michael R.

    for victims. Crime rates overall are low. The largest issue on campus is theft of personal property), the Director of the Undergraduate Research Opportunities Program, the Assistant Vice Chancellor of Student, 48 recommendations were made. UC Irvine formed an event management team which works prior to events

  18. SANCTIONING GUIDELINES STUDENT ORGANIZATION VIOLATIONS

    E-Print Network [OSTI]

    Gering, Jon C.

    and facilitate risk management program that focuses on ethical #12;Student Conduct Code: Sanctioning Guidelines and the consequences of property damage or theft. · Every person involved in incident write a reflection paper. · Every. Taking property/property damage 1.1. Intentional taking of (a) University property or (b) property

  19. U N I V E R S I T Y O F F L O R I D A I N F O R M AT I O N P R I V A C Y P O L I C I E S & P R O C E D U R E S

    E-Print Network [OSTI]

    Pilyugin, Sergei S.

    to repay the funds or repayable from specific property pledged by or on behalf of the person (i E D U R E S GENERAL PRIVACY MANAGEMENT Privacy Policy & Procedure ManualGeneral Privacy Management. Identity Theft Prevention Program Use of Social Security Numbers and Financial Information POLICIES Rev

  20. MEMBER HANDBOOK Klotsche Center and Pavilion

    E-Print Network [OSTI]

    Saldin, Dilano

    Rooms 8. Loss or Theft 9. Lost and Found 10. Personal Property 11. Plastic Water Bottles 12 within the Division of Student Affairs and manages the facilities and the recreational sport programs VALUES 3 II. GENERAL 3 1. Facilities 2. Location 3. Phone Numbers 4. Hours 5. Programming 6. Reservation

  1. Uncertainty Bounds for Digital Forensic Evidence and Hypotheses Richard E Overill and Jantje A M Silomon

    E-Print Network [OSTI]

    Overill, Richard E.

    material using Cyberlocker (CL); · theft of online game weapons (GW); · distributed denial of service (DDoS the previously proposed operational complexity model (OCM) is a case in point. It is often is necessary. In this study, the uncertainties associated with five common e-crimes and their respective Trojan horse defences

  2. Apparatus for safeguarding a radiological source

    DOE Patents [OSTI]

    Bzorgi, Fariborz M

    2014-10-07T23:59:59.000Z

    A tamper detector is provided for safeguarding a radiological source that is moved into and out of a storage location through an access porthole for storage and use. The radiological source is presumed to have an associated shipping container approved by the U.S. Nuclear Regulatory Commission for transporting the radiological source. The tamper detector typically includes a network of sealed tubing that spans at least a portion of the access porthole. There is an opening in the network of sealed tubing that is large enough for passage therethrough of the radiological source and small enough to prevent passage therethrough of the associated shipping cask. Generally a gas source connector is provided for establishing a gas pressure in the network of sealed tubing, and a pressure drop sensor is provided for detecting a drop in the gas pressure below a preset value.

  3. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  4. Acoustic resonance spectroscopy in nuclear safeguards

    SciTech Connect (OSTI)

    Olinger, C.T.; Lyon, M.J.; Stanbro, W.D.; Mullen, M.F.; Sinha, D.N.

    1993-08-01T23:59:59.000Z

    Objects resonate at specific frequencies when mechanically excited. The specific resonance frequencies are a function of shape, size, material of construction, and contents of the object. This paper discusses the use of acoustic resonance spectroscopy (ARS) to monitor containers and detect tampering. Evaluation of this technique is based on simulated storage simulations. Although these simulations show promise for this application of ARS, final evaluation will require actual field testing.

  5. Acoustic resonance spectroscopy in nuclear safeguards

    SciTech Connect (OSTI)

    Olinger, C.T.; Lyon, M.J.; Stanbro, W.D.; Mullen, M.F.; Sinha, D.N. [Los Alamos National Lab., NM (United States)

    1993-12-31T23:59:59.000Z

    Objects resonate at specific frequencies when mechanically excited. The specific resonance frequencies are a function of shape, size, material of construction, and contents of the object. This paper discusses the use of acoustic resonance spectroscopy (ARS) to monitor containers and detect tampering. Evaluation of this technique is based on simulated storage situations. Although these simulations show promise for this application of ARS, final evaluation will require actual field testing.

  6. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Groundwater monitoring system

    DOE Patents [OSTI]

    Ames, Kenneth R. (Pasco, WA); Doesburg, James M. (Richland, WA); Eschbach, Eugene A. (Richland, WA); Kelley, Roy C. (Kennewick, WA); Myers, David A. (Richland, WA)

    1987-01-01T23:59:59.000Z

    A groundwater monitoring system includes a bore, a well casing within and spaced from the bore, and a pump within the casing. A water impermeable seal between the bore and the well casing prevents surface contamination from entering the pump. Above the ground surface is a removable operating means which is connected to the pump piston by a flexible cord. A protective casing extends above ground and has a removable cover. After a groundwater sample has been taken, the cord is disconnected from the operating means. The operating means is removed for taking away, the cord is placed within the protective casing, and the cover closed and locked. The system is thus protected from contamination, as well as from damage by accident or vandalism.

  8. Evaluating alternative responses to safeguards alarms

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; McCord, R.K.

    1982-04-15T23:59:59.000Z

    This paper describes a quantitative approach to help evaluate and respond to safeguards alarms. These alarms may be generated internally by a facility's safeguards systems or externally by individuals claiming to have stolen special nuclear material (SNM). This approach can be used to identify the most likely cause of an alarm - theft, hoax, or error - and to evaluate alternative responses to alarms. Possible responses include conducting investigations, initiating measures to recover stolen SNM, and replying to external threats. Based on the results of each alarm investigation step, the evaluation revises the likelihoods of possible causes of an alarm, and uses this information to determine the optimal sequence of further responses. The choice of an optimal sequence of responses takes into consideration the costs and benefits of successful thefts or hoaxes. These results provide an analytical basis for setting priorities and developing contingency plans for responding to safeguards alarms.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  10. Before the deluge? Assessing the threat of nuclear leakage from the post-Soviet states

    SciTech Connect (OSTI)

    Potter, W.C.

    1995-10-01T23:59:59.000Z

    Most nuclear security problems are linked to the Russian Federation and the region`s troubled economic, political and social conditions. They are unlikely to be resolved without substantial progress in stabilizing the economy and renewing public trust in government institutions. The author makes a risk assessment of the threat and cites specific cases of theft and diversion of fissile materials and the need for action to control this activity. 17 refs.

  11. Cryptanalysis of S-DES Dr. K. S. Ooi

    E-Print Network [OSTI]

    Babinkostova, Liljana

    recovery. Other forms of security threat do exist, for example: identity theft, cyber stalking and cyber-DES Results 8.8 Difference Pair Table of S0 8.9 Difference Pair Table of S1 8.10 Difference Distribution Table of S0 8.11 Difference Distribution Table of S1 8.12 Differential Characteristic of S-DES 8.13 I/0 Table

  12. THE IMPACT OF ANCHOR ITEM EXPOSURE ON MEAN/SIGMA LINKING AND IRT TRUE SCORE EQUATING UNDER THE NEAT DESIGN

    E-Print Network [OSTI]

    Barri, Moatasim Asaad

    2013-08-31T23:59:59.000Z

    have evaluated the impact of exposed anchor items on the IRT equating process using Monte Carlo investigations (Jurich, DeMars, & Goodman, 2012; Jurich, Goodman, & Becker, 2010). However, studies of item exposure up to this date 3 have not placed... condition that included examinees with a low level of ability or the condition with the organized item theft group. Few studies have investigated the impact of exposed anchor items on the IRT equating process using Monte Carlo investigations. Jurich, De...

  13. Factors that Influence an Administrator's Decision to Seek Dismissal of Tenured Teachers

    E-Print Network [OSTI]

    Mitchell, Ron

    2011-05-31T23:59:59.000Z

    satisfactory manner in the given academic environment. Examples of immorality held valid in the dismissal of tenured teacher include sexual involvement with students, homosexuality, stealing money or materials, and growing or smoking marijuana (Permuth..., and dealing or growing marijuana, sexual deviancy and theft. Turpitude 11 is not only immoral, but also clearly detestable as defined by community mores and values (Permuth & Egley, 2002). Neglect of Duty Neglect of duty in general means...

  14. Drugs offshore: companies stepping up fight against hidden adversary

    SciTech Connect (OSTI)

    Redden, J.

    1986-01-01T23:59:59.000Z

    Oil companies worldwide are effectively fighting a growing nemesis, drug and alcohol abuse on offshore installations. It is estimated that companies are losing millions of dollars in lost productivity, accidents, and thefts caused by on-the-job use of illegal drugs. Some of the measures being employed to combat the use of such drugs, e.g., tight control, better communications, diversions for employees, and the use of sniffer dogs, are discussed.

  15. Home and Farm Security Machinery and Equipment Identification.

    E-Print Network [OSTI]

    Nelson, Gary S.

    1982-01-01T23:59:59.000Z

    73 Fibme and Farm Security -m Machinery and Equipment identification Home and Farm Security chinery and Equipment Identification *Gary S. Nelson is no longer just an urban problem. d burglaries in rural communities have to an alarming... insurance y equipment replacement, lost work urs and so forth. mers can discourage and minimize y theft from their farms is by providing a law enforcement officers to easily identify Mark all machinery and tools with a tification number (ID). Use...

  16. Insider Threat - Material Control and Accountability Mitigation (Presentation)

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

  17. A GAMMA RAY SCANNING APPROACH TO QUANTIFY SPENT FUEL CASK RADIONUCLIDE CONTENTS

    SciTech Connect (OSTI)

    Branney, S.

    2011-07-01T23:59:59.000Z

    The International Atomic Energy Agency (IAEA) has outlined a need to develop methods of allowing re-verification of LWR spent fuel stored in dry storage casks without the need of a reference baseline measurement. Some scanning methods have been developed, but improvements can be made to readily provide required data for spent fuel cask verification. The scanning process should be conditioned to both confirm the contents and detect any changes due to container/contents degradation or unauthorized removal or tampering. Savannah River National Laboratory and The University of Tennessee are exploring a new method of engineering a high efficiency, cost effective detection system, capable of meeting the above defined requirements in a variety of environmental situations. An array of NaI(Tl) detectors, arranged to form a 'line scan' along with a matching array of 'honeycomb' collimators provide a precisely defined field of view with minimal degradation of intrinsic detection efficiency and with significant scatter rejection. Scanning methods are adapted to net optimum detection efficiency of the combined system. In this work, and with differing detectors, a series of experimental demonstrations are performed that map system spatial performance and counting capability before actual spent fuel cask scans are performed. The data are evaluated to demonstrate the prompt ability to identify missing fuel rods or other content abnormalities. To also record and assess cask tampering, the cask is externally examined utilizing FTIR hyper spectral and other imaging/sensing approaches. This provides dated records and indications of external abnormalities (surface deposits, smears, contaminants, corrosion) attributable to normal degradation or to tampering. This paper will describe the actual gathering of data in both an experimental climate and from an actual spent fuel dry storage cask, and how an evaluation may be performed by an IAEA facility inspector attempting to draw an independent safeguards conclusion concerning the status of the special nuclear material.

  18. U.S. second line of defense: preventing nuclear smuggling across Russia's borders

    SciTech Connect (OSTI)

    Ball, D. Y.

    1998-11-16T23:59:59.000Z

    Preventing the theft of weapons-usable highly enriched uranium and plutonium in Russia is one of the central security concerns facing the US today. The dissolution of the highly centralized USSR and the resulting societal crisis has endangered Russia's ability to protect its more than 200 metric tons of plutonium and 1000 tons of highly enriched uranium (roughly 8 kg Pu or 25 kg HEU is sufficient to make a bomb). Producing this fissile material is the most difficult and expensive part of nuclear weapons production and the US must make every effort to ensure that fissile material (and nuclear-related technologies) does not reach the hands of terrorist groups, rogue states or other potential proliferators. In response to this concern, the US has undertaken a number of initiatives in partnership with Russia and other FSU states to prevent the theft of fissile material. The Material Protection, Control and Accounting Program (MPC&A) was begun in 1993 to prevent the theft of nuclear materials from Russian civilian complexes, that is facilities not under control of the Ministry of Defense, which is largely responsible for possession and oversight of nuclear weapons. The MPC&A program is considered the first line of defense against theft of nuclear material because its goal is to prevent theft of material at production and storage facilities. This year the Department of Energy (DOE) initiated a new program called the Second Line of Defense (SLD), the goal of which is to assist Russia in preventing the smuggling of nuclear material and weapons at its borders, either by land, sea or air. The SLD program represents an important phase in the overall effort to ensure the security of nuclear material and weapons in Russia. However, as the US engages Russian customs officials in this important project, Americans should keep in mind that providing equipment--even indigenous equipment--is insufficient by itself; material aid must be accompanied by rigorous inspection and accounting procedures. In addition, the equipment must be assessed according to international standards to ensure a high degree of confidence in its nuclear detection capability.

  19. The Genesis Aftermath

    E-Print Network [OSTI]

    Verba, Joan Marie

    1986-01-01T23:59:59.000Z

    . On the GRISSOM, Spock goes into a coma. The Klingons cross the border and head straight for the antimatter plant. On Earth, the EXCELSIOR and ENTERPRISE test their engines, and the EXCELSIOR work crew tries to tamper with the ENTERPRISE. Chapter 6 Wherein...'ve had some discussions, With Intelligence. Our guess is that they'll either try to lay claim to another agriclll tural planet in the buffer zone, 1 or they'll go after the new antimatter plant." "Into the Bubble? That's a long way for them to go...

  20. Evaluations of fiber optic sensors for interior applications

    SciTech Connect (OSTI)

    Sandoval, M.W.; Malone, T.P.

    1996-02-01T23:59:59.000Z

    This report addresses the testing and evaluation of commercial fiber optic intrusion detection systems in interior applications. The applications include laying optical fiber cable above suspended ceilings to detect removal of ceiling tiles, embedding optical fibers inside a tamper or item monitoring blanket that could be placed over an asset, and installing optical fibers on a door to detect movement or penetration. Detection capability of the fiber optic sensors as well as nuisance and false alarm information were focused on during the evaluation. Fiber optic sensor processing, system components, and system setup are described.

  1. Rotary mechanical latch

    DOE Patents [OSTI]

    Spletzer, Barry L.; Martinez, Michael A.; Marron, Lisa C.

    2012-11-13T23:59:59.000Z

    A rotary mechanical latch for positive latching and unlatching of a rotary device with a latchable rotating assembly having a latching gear that can be driven to latched and unlatched states by a drive mechanism such as an electric motor. A cam arm affixed to the latching gear interfaces with leading and trailing latch cams affixed to a flange within the drive mechanism. The interaction of the cam arm with leading and trailing latch cams prevents rotation of the rotating assembly by external forces such as those due to vibration or tampering.

  2. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect (OSTI)

    Jared Verba; Michael Milvich

    2008-05-01T23:59:59.000Z

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  3. Assessment of institutional barriers to the use of natural gas in automotive vehicle fleets

    SciTech Connect (OSTI)

    Jablonski, J.; Lent, L.; Lawrence, M.; White, L.

    1983-08-01T23:59:59.000Z

    Institutional barriers to the use of natural gas as a fuel for motor vehicle fleets were identified and assessed. Recommendations for barrier removal were then developed. The research technique was a combination of literature review and interviews of knowledgeable persons in government and industry, including fleet operators and marketers of natural gas vehicles and systems. Eight types of institutional barriers were identified and assessed. The most important were two safety-related barriers: (1) lack of a national standard for the safety design and certification of natural gas vehicles and refueling stations; and (2) excessively conservative or misapplied state and local regulations, including bridge and tunnel restrictions, restrictions on types of vehicles that may be fueled by natural gas, zoning regulations that prohibit operation of refueling stations, parking restrictions, application of LPG standards to LNG vehicles, and unintentionally unsafe vehicle or refueling station requirements. Other barriers addressed include: (3) need for clarification of EPA's tampering enforcement policy; (4) the US hydrocarbon standard; (5) uncertainty concerning state utility commission jurisdiction; (6) sale-for-resale prohibitions imposed by natural gas utility companies or state utility commissions; (7) uncertainty of the effects of conversions to natural gas on vehicle manufacturers warranties; and (8) need for a natural gas to gasoline-equivalent-units conversion factor for use in calculation of state road use taxes. Insurance on natural gas vehicles, and state emissions and anti-tampering regulations were also investigated as part of the research but were not found to be barriers.

  4. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31T23:59:59.000Z

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  5. A secure email login system using virtual password

    E-Print Network [OSTI]

    Doshi, Nishant

    2010-01-01T23:59:59.000Z

    In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks, keylogging attack and shoulder surfing system. In ICC 2010 Li's given a security attack on the Lei's work. This paper gives modification on Lei's work to prevent the Li's attack with reducing the server overhead. This paper also discussed the problems with current password recovery system and gives the better approach.

  6. US Department of Energy (DOE)/Gosatomnadzor (GAN) of Russia project at the Petersburg Nuclear Physics Institute (PNPI)

    SciTech Connect (OSTI)

    Baranov, I.A.; Konoplev, K.A. [Petersburg Nuclear Physics Institute, Gatchina (Russian Federation); Hauser, G.C. [Sandia National Lab., Albuquerque, NM (United States)] [and others

    1997-08-01T23:59:59.000Z

    This paper presents a summary of work accomplished within the scope of the DOE-Gosatomnadzor (GAN) Agreement to reduce vulnerability to theft of direct-use nuclear materials in Russia. The DOE-GAN agreement concerns the Russian Academy of Science B.P. Konstantinov Petersburg Nuclear Physics Institute (PNPI), located 45 kilometers from St. Petersburg. The PNPI operates facilities to research basic nuclear physics. Current world conditions require particular attention to the issue of Material Protection, Control, and Accounting (MPC&A) of nuclear materials. The long-term plan to increase security at the facility is outlined, including training, physical protection upgrades, and material control and accountability. 4 figs.

  7. Study of the 1991 unaccounted-for gas volume at the Southern California Gas Company. Final report, January 1991-December 1992. Volume 1. Project summary

    SciTech Connect (OSTI)

    Meshkati, S.; Groot, J.; Law, E.; Ozenne, D.

    1993-01-01T23:59:59.000Z

    A study of unaccounted-for gas (UAF), performed by the Southern California Gas Company (SoCalGas) to determine the UAF gas volume in the SoCalGas system, to identify the factors contributing to UAF, and to estimate the gas volume associated with each factor, is described. It was found that measurement-related effects contributed more than 80% of SoCalGas' 1991 UAF volume. Less than 3% is associated with adjustments to SoCalGas' accounting system, and approximately 6% is associated with losses due to theft. Testing showed that the leakage element contributed only 8% of the UAF volume.

  8. Unaccounted-for gas project. Data bases. Volume 5. Final report

    SciTech Connect (OSTI)

    Cowgill, R.; Waller, R.L.; Grinstead, J.R.

    1990-06-01T23:59:59.000Z

    The study identifies, explains, and quantifies unaccounted-for (UAF) gas volumes resulting from operating Pacific Gas and Electric (PG E) Co.'s gas transmission and distribution systems during 1987. The results demonstrate that the UAF volumes are reasonable for determining the indirectly billed gas requirements component of the gas cost and for operating the PG E gas system. Gas leakage is a small percentage of UAF. Summaries of studies on gas leakage, gas theft, measurement inaccuracies, and accounting methodologies are presented along with recommendations for further work which could reduce or more accurately measure UAF.

  9. US-Russian Cooperation in Upgrading MC&A System at Rosatom Facilities: Measurement of Nuclear Materials

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Jensen, Bruce A [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Improve protection of weapons-usable nuclear material from theft or diversion through the development and support of a nationwide sustainable and effective Material Control and Accountability (MC&A) program based on material measurement. The material protection, control, and accountability (MPC&A) cooperation has yielded significant results in implementing MC&A measurements at Russian nuclear facilities: (1) Establishment of MEM WG and MEMS SP; (2) Infrastructure for development, certification, and distribution of RMs; and (3) Coordination on development and implementation of MMs.

  10. Security of Bhutan: Walking Between the Giants

    E-Print Network [OSTI]

    Penjore, Dorji

    2004-01-01T23:59:59.000Z

    . Beginning of an Aerial Invasion Bhutan became the last nation in the world to introduce television in 1999, and a few years later a crime waves of murder, homicide, shop-lifting, burglary, theft, fraud, drunk driving followed, together with students... ), and the introduction of satellite TV and information technology which are changing the very fabrics on which Bhutan’s national identity is writ large. Besides other problems, the above three issues are going to have major impacts on the security of Bhutan...

  11. RadSTraM: Radiological Source Tracking and Monitoring, Phase II Final Report

    SciTech Connect (OSTI)

    Warren, Tracy A [ORNL; Walker, Randy M [ORNL; Hill, David E [ORNL; Gross, Ian G [ORNL; Smith, Cyrus M [ORNL; Abercrombie, Robert K [ORNL

    2008-12-01T23:59:59.000Z

    This report focuses on the technical information gained from the Radiological Source Tracking and Monitoring (RadSTraM) Phase II investigation and its implications. The intent of the RadSTraM project was to determine the feasibility of tracking radioactive materials in commerce, particularly International Atomic Energy Agency (IAEA) Category 3 and 4 materials. Specifically, Phase II of the project addressed tracking radiological medical isotopes in commerce. These categories of materials are susceptible to loss or theft but the problem is not being addressed by other agencies.

  12. Concealed identification symbols and nondestructive determination of the identification symbols

    DOE Patents [OSTI]

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16T23:59:59.000Z

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  13. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    SciTech Connect (OSTI)

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01T23:59:59.000Z

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

  14. Crime and Fire Log Nature Case No. Date/Time Reported Date/Time Occurred Location Disposition

    E-Print Network [OSTI]

    Loudon, Catherine

    /27/2011 1023 W Peltason Dr, Irvine Inactive 12/27/2011 Battery On Person 11-1409 12/24/2011 21:30 12/24/2011 22/30/2011 - 12/10/2011 6322 Verano Rd, Irvine Inactive 12/11/2011 Battery On Person 11-1369 12/10/2011 01:34 12/10/2011 01:33 - 12/10/2011 International Peace House Pending Grand Theft:Money/Prop/Etc $950+ 11-1366 12

  15. Texas 4-H Horse Project Teaching Outlines

    E-Print Network [OSTI]

    Howard, Jeff W.; Johnson, Ken; Mason, Vanessa; Mitchell, Julianne

    2000-06-15T23:59:59.000Z

    and Selling Horses at Public Auction 167 A Professional Approach to Marketing Horses 173 What To Do If Your Horse Is Lost or Stolen 181 Freeze Branding 187 Horse Theft in Texas 193 Texas Essential Knowledge and Skills 199 Reference: Texas Horse Owner... the distance from the corner to the tail. b. Two people are needed to measure body length. B. When learning to use this weight estimation system, it is often useful to weigh the horse on a scale for com- parison. C. It is important that the horse stand somewhat...

  16. Documentation of a Model Action Plan to Deter Illicit Nuclear Trafficking

    SciTech Connect (OSTI)

    Smith, D; Kristo, M; Niemeyer, S; Dudder, G

    2006-07-28T23:59:59.000Z

    Theft, illegal possession, smuggling, or attempted unauthorized sale of nuclear and radiological materials remains a worldwide problem. The Nuclear Smuggling International Technical Working Group (ITWG) has adopted a model action plan to guide investigation of these cases through a systematic approach to nuclear forensics. The model action plan was recently documented and provides recommendations concerning incident response, collection of evidence in conformance with required legal standards, laboratory sampling and distribution of samples, radioactive materials analysis, including categorization and characterization of samples, forensics analysis of conventional evidence, and case development including interpretation of forensic signatures.

  17. Documentation of a model action plan to deter illicit nuclear trafficking

    SciTech Connect (OSTI)

    Smith, D. K.; Kristo, M. J.; Niemeyer, S.; Dudder, Gordon B.

    2008-05-04T23:59:59.000Z

    Theft, illegal possession, smuggling, or attempted unathorized sale of nuclear and radiological materials remains a worldwide problem. The Nuclear Smuggling International Technical Working Group (ITWG) has adopted a model action plan to guide investigation of these cases through a systematic approach to nuclear forensics. The model action plan was recently documented and provides recommendations concerning incident response, collection of evidence in conformance with required legal standards, laboratory sampling and distribution of samples, radioactive materials analysis, including categorization and characterization of samples, forensics analysis of conventional evidence, and case development including interpretation of forensic signatures.

  18. Hybrid GPS-GSM Localization of Automobile Tracking System

    E-Print Network [OSTI]

    Al-Khedher, Mohammad A

    2012-01-01T23:59:59.000Z

    An integrated GPS-GSM system is proposed to track vehicles using Google Earth application. The remote module has a GPS mounted on the moving vehicle to identify its current position, and to be transferred by GSM with other parameters acquired by the automobile's data port as an SMS to a recipient station. The received GPS coordinates are filtered using a Kalman filter to enhance the accuracy of measured position. After data processing, Google Earth application is used to view the current location and status of each vehicle. This goal of this system is to manage fleet, police automobiles distribution and car theft cautions.

  19. ©Wilolud Online Journals, 2008. THE NIGERIAN FUEL ENERGY SUPPLY CRISIS AND THE PROPOSED PRIVATE REFINERIES – PROSPECTS AND PROBLEMS

    E-Print Network [OSTI]

    Agwom Sani Z

    Dynamism of the world economy has compelled Nigerians to accept the liberalization of its economy to encourage private sector participation and induce managerial efficiency. This has become very imperative most especially, in the downstream sub-sector of the Nigerian oil and gas industry by the establishment and management of private refineries in view of the persistent fuel energy crisis. An attempt is made here at analyzing the prospects and problems of such refineries that are expected to end the fuel energy crisis which started in the 1970s due to increased demand for petroleum products for rehabilitation and reconstruction after the civil war but later metamorphosed into a hydraheaded monster in the 1980s to date. Efforts towards arresting this crisis by the government through the establishment of more refineries, storage depots and network of distribution pipelines etc achieved a short-term solution due to the abysmal low performance of the refineries and facilities in contrast to increasing demand for petroleum products. It is deduced that the low performance resulted from bad and corrupt management by indigenous technocrats and political leaders as well as vandalization of facilities. Prospects for such investments were identified, as well as some of the problems to content with. This is in order to understand the pros and cons of such investments in view of their capital intensiveness and the need to achieve economic goals that must incorporate environmental and social objectives.

  20. Day, night and all-weather security surveillance automation synergy from combining two powerful technologies

    SciTech Connect (OSTI)

    Morellas, Vassilios; Johnson, Andrew [Honeywell Labs, 3660, Technology Drive, Minneapolis MN 5518 (United States); Johnston, Chris [Honeywell ACS, 1985 Douglas Drive North, Golden Valley MN 55422 (United States); Roberts, Sharon D.; Francisco, Glen L. [L-3 Communications Infrared Products, 13532 N. Central Expressway, Dallas TX 75243 (United States)

    2006-07-01T23:59:59.000Z

    Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff and landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)

  1. An Analysis of Anonymity in the Bitcoin System

    E-Print Network [OSTI]

    Reid, Fergal

    2011-01-01T23:59:59.000Z

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  3. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  4. ASSESS (Analytic System and Software for Evaluating Safeguards and Security) update: Current status and future developments

    SciTech Connect (OSTI)

    Al-Ayat, R.A. (Lawrence Livermore National Lab., CA (USA)); Cousins, T.D. (USDOE, Washington, DC (USA)); Hoover, E.R. (Sandia National Labs., Albuquerque, NM (USA))

    1990-07-15T23:59:59.000Z

    The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) has been released for use by DOE field offices and their contractors. In October, 1989, we offered a prototype workshop to selected representatives of the DOE community. Based on the prototype results, we held the first training workshop at the Central Training Academy in January, 1990. Four additional workshops are scheduled for FY 1990. ASSESS is a state-of-the-art analytical tool for management to conduct integrated evaluation of safeguards systems at facilities handling facilities. Currently, ASSESS focuses on the threat of theft/diversion of special nuclear material by insiders, outsiders, and a special form of insider/outsider collusion. ASSESS also includes a neutralization module. Development of the tool is continuing. Plans are underway to expand the capabilities of ASSESS to evaluate against violent insiders, to validate the databases, to expand the neutralization module, and to assist in demonstrating compliance with DOE Material Control and Accountability (MC A) Order 5633.3. These new capabilities include the ability to: compute a weighted average for performance capability against a spectrum of insider adversaries; conduct defense-in-depth analyses; and analyze against protracted theft scenarios. As they become available, these capabilities will be incorporated in our training program. ASSESS is being developed jointly by Lawrence Livermore and Sandia National Laboratories under the sponsorship of the Department of Energy (DOE) Office of Safeguards and Security.

  5. FRAMES-2.0 Software System: Providing Password Protection and Limited Access to Models and Simulations

    SciTech Connect (OSTI)

    Whelan, Gene; Pelton, Mitch A.

    2007-08-09T23:59:59.000Z

    One of the most important concerns for regulatory agencies is the concept of reproducibility (i.e., reproducibility means credibility) of an assessment. One aspect of reproducibility deals with tampering of the assessment. In other words, when multiple groups are engaged in an assessment, it is important to lock down the problem that is to be solved and/or to restrict the models that are to be used to solve the problem. The objective of this effort is to provide the U.S. Nuclear Regulatory Commission (NRC) with a means to limit user access to models and to provide a mechanism to constrain the conceptual site models (CSMs) when appropriate. The purpose is to provide the user (i.e., NRC) with the ability to “lock down” the CSM (i.e., picture containing linked icons), restrict access to certain models, or both.

  6. Supplemental Systems for Unattended UF6 Cylinder Monitoring

    SciTech Connect (OSTI)

    Curtis, Michael M.

    2010-08-11T23:59:59.000Z

    Cylinder assay and mass measurements, the mainstay of enrichment plant verification efforts have historically been performed by International Atomic Energy Agency (IAEA) inspectors using portable equipment. For the sake of efficiency, accuracy, and timeliness, such equipment is being supplanted by unattended measurement stations. Ancillary systems must be employed with such stations to ensure that measured parameters are properly recorded, cylinders are positively identified, operations occur according to procedure, and no tampering takes place in the inspectors’ absence. Depending on the facility, it may prove feasible to track cylinders from the measurement vicinity to their storage locations using surveillance. This paper will provide a cursory description of the various subsystems associated with Pacific Northwest National Laboratory’s Integrated Cylinder Verification Station and how inattention to the requirements of such systems could seriously diminish the capability of the integrated whole.

  7. A Zero Knowledge Protocol For Nuclear Warhead Verification

    SciTech Connect (OSTI)

    Glaser, Alexander [Princeton, Univ., NJ (United States). Program on Science and Global Security] [Princeton, Univ., NJ (United States). Program on Science and Global Security; Goldston, Robert J. [Princeton Plasma Physics Lab., Princeton, NJ (United States)] [Princeton Plasma Physics Lab., Princeton, NJ (United States)

    2014-03-14T23:59:59.000Z

    The verification of nuclear warheads for arms control faces a paradox: International inspectors must gain high confidence in the authenticity of submitted items while learning nothing about them. Conventional inspection systems featuring ''information barriers'', designed to hide measurments stored in electronic systems, are at risk of tampering and snooping. Here we show the viability of fundamentally new approach to nuclear warhead verification that incorporates a zero-knowledge protocol, designed such that sensitive information is never measured so does not need to be hidden. We interrogate submitted items with energetic neutrons, making in effect, differential measurements of neutron transmission and emission. Calculations of diversion scenarios show that a high degree of discrimination can be achieved while revealing zero information. Timely demonstration of the viability of such an approach could be critical for the nexxt round of arms-control negotiations, which will likely require verification of individual warheads, rather than whole delivery systems.

  8. Threshold Verification Technique for Network Intrusion Detection System

    E-Print Network [OSTI]

    Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

    2009-01-01T23:59:59.000Z

    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

  9. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  10. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  11. The Infrastructure Necessary to Support a Sustainable Material Protection, Control and Accounting (MPC&A) Program in Russia

    SciTech Connect (OSTI)

    Bachner, Katherine M.; Mladineo, Stephen V.

    2011-07-20T23:59:59.000Z

    The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support the Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.

  12. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  13. The effects of material properties and confinement on DDT

    SciTech Connect (OSTI)

    Lee, E.L.; Weston, A.M.; Aldis, D.F.

    1990-03-13T23:59:59.000Z

    We have used a DDT numerical code, RDUCT, to evaluate the effect of material properties and confinement on DDT in porous beds. RDUCT is a 1-D solid and gas two phase hydrodynamic program that computes deflagration to detonation transition in porous beds, using and ignition and growth'' type reaction model in a solid phase Lagrange coordinate system. The calculation model contains tamper masses at both ends of the reacting bed and is ignited by a squib at one end. Here RDUCT is used to compute the growth of reaction in porous bed inside a rigid tube. The input parameters are varied to produce changes in ignition, burn rate, and confinement. The results of this study illustrate the great sensitivity of the DDT phenomenon to these basic parameters. Implications to modelling and to practical problems of hazard are discussed. 15 refs., 19 figs., 2 tabs.

  14. Privacy Amplification in the Isolated Qubits Model

    E-Print Network [OSTI]

    Yi-Kai Liu

    2015-02-11T23:59:59.000Z

    Isolated qubits are a special class of quantum devices, which can be used to implement tamper-resistant cryptographic hardware such as one-time memories (OTM's). Unfortunately, these OTM constructions leak some information, and standard methods for privacy amplification cannot be applied here, because the adversary has advance knowledge of the hash function that the honest parties will use. In this paper we show a stronger form of privacy amplification that solves this problem, using a fixed hash function that is secure against all possible adversaries in the isolated qubits model. This allows us to construct single-bit OTM's which only leak an exponentially small amount of information. We then study a natural generalization of the isolated qubits model, where the adversary is allowed to perform a polynomially-bounded number of entangling gates, in addition to unbounded local operations and classical communication (LOCC). We show that our technique for privacy amplification is also secure in this setting.

  15. The Mailbox Computer System for the IAEA verification experiment on HEU downlending at the Portsmouth Gaseous Diffusion Plant

    SciTech Connect (OSTI)

    Aronson, A.L.; Gordon, D.M.

    2000-07-31T23:59:59.000Z

    IN APRIL 1996, THE UNITED STATES (US) ADDED THE PORTSMOUTH GASEOUS DIFFUSION PLANT TO THE LIST OF FACILITIES ELIGIBLE FOR THE APPLICATION OF INTERNATIONAL ATOMIC ENERGY AGENCY (IAEA) SAFEGUARDS. AT THAT TIME, THE US PROPOSED THAT THE IAEA CARRY OUT A ''VERIFICATION EXPERIMENT'' AT THE PLANT WITH RESPECT TO DOOWNBLENDING OF ABOUT 13 METRIC TONS OF HIGHLY ENRICHED URANIUM (HEU) IN THE FORM OF URANIUM HEXAFLUROIDE (UF6). DURING THE PERIOD DECEMBER 1997 THROUGH JULY 1998, THE IAEA CARRIED OUT THE REQUESTED VERIFICATION EXPERIMENT. THE VERIFICATION APPROACH USED FOR THIS EXPERIMENT INCLUDED, AMONG OTHER MEASURES, THE ENTRY OF PROCESS-OPERATIONAL DATA BY THE FACILITY OPERATOR ON A NEAR-REAL-TIME BASIS INTO A ''MAILBOX'' COMPUTER LOCATED WITHIN A TAMPER-INDICATING ENCLOSURE SEALED BY THE IAEA.

  16. Reverse Engineering Socialbot Infiltration Strategies in Twitter

    E-Print Network [OSTI]

    Freitas, Carlos A; Ghosh, Saptarshi; Veloso, Adriano

    2014-01-01T23:59:59.000Z

    Data extracted from social networks like Twitter are increasingly being used to build applications and services that mine and summarize public reactions to events, such as traffic monitoring platforms, identification of epidemic outbreaks, and public perception about people and brands. However, such services are vulnerable to attacks from socialbots $-$ automated accounts that mimic real users $-$ seeking to tamper statistics by posting messages generated automatically and interacting with legitimate users. Potentially, if created in large scale, socialbots could be used to bias or even invalidate many existing services, by infiltrating the social networks and acquiring trust of other users with time. This study aims at understanding infiltration strategies of socialbots in the Twitter microblogging platform. To this end, we create 120 socialbot accounts with different characteristics and strategies (e.g., gender specified in the profile, how active they are, the method used to generate their tweets, and the ...

  17. A "Proof-of-Concept" Demonstration of RF-Based Technologies for UF6 Cylinder Tracking at Centrifuge Enrichment Plant

    SciTech Connect (OSTI)

    Pickett, Chris A [ORNL] [ORNL; Younkin, James R [ORNL] [ORNL; Kovacic, Donald N [ORNL] [ORNL; Dixon, E. T. [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL); Martinez, B. [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL)

    2007-01-01T23:59:59.000Z

    This effort describes how radio-frequency (RF) technology can be integrated into a uranium enrichment facility's nuclear materials accounting and control program to enhance uranium hexafluoride (UF6) cylinder tracking and thus provide benefits to both domestic and international safeguards. Approved industry-standard cylinders are used to handle and store UF6 feed, product, tails, and samples at uranium enrichment plants. In the international arena, the International Atomic Energy Agency (IAEA) relies on time-consuming manual cylinder inventory and tracking techniques to verify operator declarations and to detect potential diversion of UF6. Development of a reliable, automated, and tamper-resistant process for tracking and monitoring UF6 cylinders would greatly reduce the risk of false or misreported cylinder tare weights, diversion of nuclear material, concealment of excess production, utilization of undeclared cylinders, and misrepresentation of the cylinders contents. This paper will describe a "proof-of concept" system that was designed show the feasibility of using RF based technologies to track individual UF6 cylinders throughout their entire life cycle, and thus ensure both increased domestic accountability of materials and a more effective and efficient method for application of IAEA international safeguards at the site level. The proposed system incorporates RF-based identification devices, which provide a mechanism for a reliable, automated, and tamper-resistant tracking network. We explore how securely attached RF tags can be integrated with other safeguards technologies to better detect diversion of cylinders. The tracking system could also provide a foundation for integration of other types of safeguards that would further enhance detection of undeclared activities.

  18. Development of a Whole Container Seal

    SciTech Connect (OSTI)

    Kuhn, Michael J [ORNL] [ORNL; Pickett, Chris A [ORNL] [ORNL; Stinson, Brad J [ORNL] [ORNL; Rowe, Nathan C [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    This paper outlines a technique for utilizing electrically conductive textiles as a whole container seal. This method has the potential to provide more robustness for ensuring that the container has not been breached versus conventional sealing methods that only provide tamper indication at the area used for normal access. The conductive textile is used as a distributed sensor for detecting and localizing container tamper or breach. For sealing purposes, the conductive fabric represents a bounded, near-infinite grid of resistors. The well-known infinite resistance grid problem was used to model and confirm the expected accuracy and validity of this approach. An experimental setup was built that uses a multiplexed Wheatstone bridge measurement to determine the resistances of a coarse electrode grid across the conductive fabric. Non-uniform resistance values of the grid infer the presence of damage or tears in the fabric. Results suggest accuracy proportional to the electrode spacing in determining the presence and location of disturbances in conductive fabric samples. Current work is focused on constructing experimental prototypes for field and environmental testing to gauge the performance of these whole container seals in real world conditions. We are also developing software and hardware to interface with the whole container seals. The latest prototypes are expected to provide more accuracy in detecting and localizing events, although detection of a penetration should be adequate for most sealing applications. We are also developing smart sensing nodes that integrate digital hardware and additional sensors (e.g., motion, humidity) into the electrode nodes within the whole container seal.

  19. Examining the Risk of Nuclear Trafficking

    SciTech Connect (OSTI)

    Balatsky, Galya [Los Alamos National Laboratory; Severe, William R [Los Alamos National Laboratory; Schoeneck, Jeffery [DHS

    2009-01-01T23:59:59.000Z

    The need to stop illicit trafficking of nuclear and radioactive materials around the world is undeniable and urgent. This issue is particularly evident due to the highly dangerous consequences of the risks involved, the known interest of terrorist groups in acquiring such materials and the vulnerability of theft and diversion of such materials. Yet the phenomenon of nuclear trafficking remains a subject where the unknown dominates what is known on the subject. The trafficking panel at the Institute for Nuclear Materials Management (INMM) Workshop on Reducing the Risk of Radioactive and Nuclear Materials that took place in Albuquerque, New Mexico, March 10-11, 2009, dealt with some of the issues associated with nuclear trafficking. Different points of view on how to better address trafficking and thwart perpetrator efforts were discussed. This paper presents some of these views and addresses practical measures that should be considered to improve the situation.

  20. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  1. A unique radioisotopic label as a new concept for safeguarding and tagging of long-term stored items and waste

    E-Print Network [OSTI]

    Dina Chernikova; Kare Axell

    2015-01-15T23:59:59.000Z

    The present paper discuss a novel method of tagging and labeling of waste casks, copper canisters, spent fuel containers, mercury containers, waste pack- ages and other items. In particular, it is related to the development of new long-term security identification tags/labels that can be applied to articles for carrying information about the content, inventory tracking, prevention of falsifi- cation and theft etc. It is suggested to use a unique combination of radioisotopes with different predictable length of life, as a label of the items. The possibil- ity to realize a multidimensional bar code symbology is proposed as an option for a new labeling method. The results of the first tests and evaluations of this are shown and discussed in the paper. The invention is suitable for use in items assigned to long-term (hundreds of years) storing or for final repositories. Alternative field of use includes fresh nuclear fuel handling and shipment of goods.

  2. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  3. Standard Guide for Post-Deactivation Surveillance and Maintenance of Radiologically Contaminated Facilities

    E-Print Network [OSTI]

    American Society for Testing and Materials. Philadelphia

    2010-01-01T23:59:59.000Z

    1.1 This guide outlines a method for developing a Surveillance and Maintenance (S&M) plan for inactive nuclear facilities. It describes the steps and activities necessary to prevent loss or release of radioactive or hazardous materials, and to minimize physical risks between the deactivation phase and the start of facility decontamination and decommissioning (D&D). 1.2 The primary concerns for S&M are related to (1) animal intrusion, (2) structural integrity degradation, (3) water in-leakage, (4) contamination migration, (5) unauthorized personnel entry, and (6) theft/intrusion. This document is intended to serve as a guide only, and is not intended to modify existing regulations.

  4. The Role of the George Kuzmycz Training Center in Improving the Nuclear Material Management Culture in Ukraine.

    SciTech Connect (OSTI)

    Gavrylyuk, V. I. (Viktor I.); Scherbachenko, A. M. (Alexander M.); Bazavov, D. A. (Dmitri A.); Kyryshchuk, V. I. (Volodymyr I.); Robinson, P. (Phil); Sheppard, G. A. (Gregory A.)

    2001-01-01T23:59:59.000Z

    The George Kuzmycz Training Center for Physical Protection, Control and Accounting (GKTC) was established in 1998 in a collaborative endeavor of the State Nuclear Regulatory Administration of Ukraine, the Ukrainian Academy of Sciences, and the U.S. Department of Energy. Located at the Institute for Nuclear Research in Kyiv, the GKTC provides theoretical and practical training in physical protection, control, and accounting techniques and systems that are employed to reduce the risk of unauthorized use, theft, or diversion of weapons-usable nuclear material. Participants in GKTC workshops and courses include nuclear facility specialists as well as officials of the State's regulatory authorities. Recently, the training scope has been broadened to include students from other nations in the region.

  5. Application of EMCAS timeliness model to the safeguards facility interface: (Final report)

    SciTech Connect (OSTI)

    Eggers, R.F.; Giese, E.W.

    1987-11-01T23:59:59.000Z

    This paper provides a method of computing the probability that a nuclear material control and accounting test will detect and insider theft of special nuclear material (SNM) in a timely fashion. Often, when nuclear facilities are evaluated for their ability to defend against this threat, the detection capability of the material accounting system is considered to be late. However, a careful examination of the adversary's most likely stealth and deceit scenarios shows that several hours or more are often required to move material beyond the protected area. If material accounting tests are conducted and verified before material leaves the protected area, they are timely. This paper shows how to compute the probability of timely detection by the material accounting system.

  6. Enduring Nuclear Fuel Cycle, Proceedings of a panel discussion

    SciTech Connect (OSTI)

    Walter, C. E., LLNL

    1997-11-18T23:59:59.000Z

    The panel reviewed the complete nuclear fuel cycle in the context of alternate energy resources, energy need projections, effects on the environment, susceptibility of nuclear materials to theft, diversion, and weapon proliferation. We also looked at ethical considerations of energy use, as well as waste, and its effects. The scope of the review extended to the end of the next century with due regard for world populations beyond that period. The intent was to take a long- range view and to project, not forecast, the future based on ethical rationales, and to avoid, as often happens, long-range discussions that quickly zoom in on only the next few decades. A specific nuclear fuel cycle technology that could satisfy these considerations was described and can be applied globally.

  7. Joint U.S./Russian plutonium disposition study: Nonproliferation issues

    SciTech Connect (OSTI)

    Jaeger, C. [Sandia National Labs., Albuquerque, NM (United States); Erkkila, B.; Fearey, B. [Los Alamos National Lab., NM (United States); Ehinger, M. [Oak Ridge National Lab., TN (United States); McAllister, S. [Lawrence Livermore National Lab., CA (United States); Chitaykin, V. [Inst. of Physics and Power Engineering, Obninsk (Russian Federation); Ptashny, V. [Inst. of Technical Physics, Snezhinsk (Russian Federation)

    1996-07-01T23:59:59.000Z

    In an effort to establish joint activities in the disposition of fissile materials from nuclear materials, the US and Russia agreed to conduct joint work to develop consistent comparisons of various alternatives for the disposition of weapons-grade plutonium. Joint working groups were established for the analysis of alternatives for plutonium management for water reactors, fast reactors, storage, geological formations, immobilization and stabilization of solutions and other forms. In addition cross-cutting working groups were established for economic analysis and nonproliferation (NP). This paper reviews the activities of the NP working group in support of these studies. The NP working group provided integrated support in the area of nuclear NP to the other US/Russian Study teams. It involved both domestic safeguards and security and international safeguards. The analysis of NP involved consideration of the resistance to theft or diversion and resistance to retrieval, extraction or reuse.

  8. Approach to proliferation risk assessment based on multiple objective analysis framework

    SciTech Connect (OSTI)

    Andrianov, A.; Kuptsov, I. [Obninsk Institute for Nuclear Power Engineering of NNRU MEPhI (Russian Federation); Studgorodok 1, Obninsk, Kaluga region, 249030 (Russian Federation)

    2013-07-01T23:59:59.000Z

    The approach to the assessment of proliferation risk using the methods of multi-criteria decision making and multi-objective optimization is presented. The approach allows the taking into account of the specifics features of the national nuclear infrastructure, and possible proliferation strategies (motivations, intentions, and capabilities). 3 examples of applying the approach are shown. First, the approach has been used to evaluate the attractiveness of HEU (high enriched uranium)production scenarios at a clandestine enrichment facility using centrifuge enrichment technology. Secondly, the approach has been applied to assess the attractiveness of scenarios for undeclared production of plutonium or HEU by theft of materials circulating in nuclear fuel cycle facilities and thermal reactors. Thirdly, the approach has been used to perform a comparative analysis of the structures of developing nuclear power systems based on different types of nuclear fuel cycles, the analysis being based on indicators of proliferation risk.

  9. Archaeological investigations on the Buckboard Mesa Road Project

    SciTech Connect (OSTI)

    Amick, D.S.; Henton, G.H.; Pippin, L.C.

    1991-10-01T23:59:59.000Z

    In 1986, the Desert Research Institute (DRI) conducted an archaeological reconnaissance of a new alignment for the Buckboard Mesa Road on the Nevada Test Site for the Department of Energy (DOE). During this reconnaissance, several archaeological sites of National Register quality were discovered and recorded including a large quarry, site 26Ny4892, and a smaller lithic scatter, site 26Ny4894. Analysis of the debitage at 26Ny4892 indicates that this area was used primarily as a quarry for relatively small cobbles of obsidian found in the alluvium. Lithic reduction techniques used here are designed for efficiently reducing small pieces of toolstone and are oriented towards producing flake blanks from small cores and bifacially reducing exhausted cores. Projectile point cross references indicate that the area has seen at least casual use for about 10,000 years and more sustained use for the last 3,000 years. Initial obsidian hydration measurements indicate sustained use of the quarry for about the last 3,000 years although the loci of activities appear to change over time. Based on this study, the DRI recommends that quarrying activities in the area of 26Ny4892 are sufficiently sampled and that additional investigations into that aspect of prehistoric activity in the area are not necessary. This does not apply to other aspects of prehistoric use. DRI recommends that preconstruction surveys continue to identify nonquarrying, prehistoric utilization of the area. With the increased traffic on the Buckboard Mesa Road, there is a greater potential for vandalism to sites of National Register-quality located near the road. The DRI recommends that during the orientation briefing the workers at the Test Site be educated about the importance of cultural resources and the need for their protection. 202 refs., 41 figs., 52 tabs.

  10. Preconceptual design for separation of plutonium and gallium by ion exchange

    SciTech Connect (OSTI)

    DeMuth, S.F.

    1997-09-30T23:59:59.000Z

    The disposition of plutonium from decommissioned nuclear weapons, by incorporation into commercial UO{sub 2}-based nuclear reactor fuel, is a viable means to reduce the potential for theft of excess plutonium. This fuel, which would be a combination of plutonium oxide and uranium oxide, is referred to as a mixed oxide (MOX). Following power generation in commercial reactors with this fuel, the remaining plutonium would become mixed with highly radioactive fission products in a spent fuel assembly. The radioactivity, complex chemical composition, and large size of this spent fuel assembly, would make theft difficult with elaborate chemical processing required for plutonium recovery. In fabricating the MOX fuel, it is important to maintain current commercial fuel purity specifications. While impurities from the weapons plutonium may or may not have a detrimental affect on the fuel fabrication or fuel/cladding performance, certifying the effect as insignificant could be more costly than purification. Two primary concerns have been raised with regard to the gallium impurity: (1) gallium vaporization during fuel sintering may adversely affect the MOX fuel fabrication process, and (2) gallium vaporization during reactor operation may adversely affect the fuel cladding performance. Consequently, processes for the separation of plutonium from gallium are currently being developed and/or designed. In particular, two separation processes are being considered: (1) a developmental, potentially lower cost and lower waste, thermal vaporization process following PuO{sub 2} powder preparation, and (2) an off-the-shelf, potentially higher cost and higher waste, aqueous-based ion exchange (IX) process. While it is planned to use the thermal vaporization process should its development prove successful, IX has been recommended as a backup process. This report presents a preconceptual design with material balances for separation of plutonium from gallium by IX.

  11. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

  12. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    SciTech Connect (OSTI)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01T23:59:59.000Z

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  13. Using a Relativistic Electron Beam to Generate Warm Dense Matter for Equation of State Studies

    SciTech Connect (OSTI)

    Berninger, M.

    2011-06-24T23:59:59.000Z

    Experimental equation-of-state (EOS) data are difficult to obtain for warm dense matter (WDM)–ionized materials at near-solid densities and temperatures ranging from a few to tens of electron volts–due to the difficulty in preparing suitable plasmas without significant density gradients and transient phenomena. We propose that the Dual Axis Radiographic Hydrodynamic Test (DARHT) facility can be used to create a temporally stationary and spatially uniform WDM. DARHT has an 18 MeV electron beam with 2 kA of current and a programmable pulse length of 20 ns to 200 ns. This poster describes how Monte Carlo n-Particle (MCNP) radiation transport and LASNEX hydrodynamics codes were used to demonstrate that the DARHT beam is favorable for avoiding the problems that have hindered past attempts to constrain WDM properties. In our concept, a 60 ns pulse of electrons is focused onto a small, cylindrical (1 mm diameter × 1 mm long) foam target, which is inside a stiff high-heat capacity tube that both confines the WDM and allows pressure measurements. In our model, the foam is made of 30% density Au and the tamper is a B4C tube. An MCNP model of the DARHT beam investigated electron collisions and the amount of energy deposited in the foam target. The MCNP data became the basis for a LASNEX source model, where the total energy was distributed over a 60 ns time-dependent linear ramp consistent with the DARHT pulse. We used LASNEX to calculate the evolution of the foam EOS properties during and after deposition. Besides indicating that a ~3 eV Au plasma can be achieved, LASNEX models also showed that the WDM generates a shock wave into the tamper whose speed can be measured using photonic Doppler velocimetry. EOS pressures can be identified to better than 10% precision. These pressures can be correlated to energy deposition with electron spectrometry in order to obtain the Au EOS. Radial uniformity in the DARHT beam was also investigated. To further obtain uniform radial energy deposition, MCNP calculations were carried out with radial beam filters. Results are presented.

  14. Inspection Report on "Internal Controls over Accountable Classified Removable Electronic Media at Oak Ridge National Laboratory"

    SciTech Connect (OSTI)

    None

    2009-05-01T23:59:59.000Z

    The Department of Energy's Oak Ridge National Laboratory (ORNL) conducts cutting edge scientific research. ORNL utilizes removable electronic media, such as computer hard drives, compact disks, data tapes, etc., to store vast amounts of classified information. Incidents involving breakdowns in controls over classified removable electronic media have been a continuous challenge for the Department. The loss of even one piece of such media can have serious national security implications. In 2004, the Department had a complex-wide 'stand-down' of all activities using classified removable electronic media, and such media containing Secret/Restricted Data or higher classified data was designated 'Accountable Classified Removable Electronic Media' (ACREM). As part of the stand-down, sites were required to conduct a 100 percent physical inventory of all ACREM; enter it all into accountability; and conduct security procedure reviews and training. Further, the Department implemented a series of controls, including conducting periodic inventories, utilizing tamper proof devices on ACREM safes, and appointing trained custodians to be responsible for the material. After performance testing and validation that the required accountability systems were in place, ACREM operations at ORNL were approved for restart on August 10, 2004. We conducted a review at ORNL and associated facilities to determine whether ACREM is managed, protected, and controlled consistent with applicable requirements. We found that: (1) Eight pieces of Secret/Restricted Data media had not been identified as ACREM and placed into a system of accountability. Consequently, the items were not subject to all required protections and controls, such as periodic accountability inventories, oversight by a trained custodian, or storage in a designated ACREM safe. (However, the items were secured in safes approved for classified material.) (2) Other required ACREM protections and controls were not implemented as follows: a tamper indicating device was not being used on an ACREM safe; records documenting when a certain safe was opened did not support that a purported inventory had been conducted; and a safe inventory had not been completed in a timely manner. (3) A Personal Digital Assistant and a thumb drive, both capable of recording or transmitting data, were stored in a security area without an analysis to identify vulnerabilities and compensatory measures having been conducted, as required. We also found that an ORNL Cooperative Research and Development Agreement partner had not disabled classified computer ports at the partner's site that were capable of writing classified information to external or removable media, as required. We made several recommendations designed to enhance the security of ACREM, security areas, and computers.

  15. Image Hashes as Templates for Verification

    SciTech Connect (OSTI)

    Janik, Tadeusz; Jarman, Kenneth D.; Robinson, Sean M.; Seifert, Allen; McDonald, Benjamin S.; White, Timothy A.

    2012-07-17T23:59:59.000Z

    Imaging systems can provide measurements that confidently assess characteristics of nuclear weapons and dismantled weapon components, and such assessment will be needed in future verification for arms control. Yet imaging is often viewed as too intrusive, raising concern about the ability to protect sensitive information. In particular, the prospect of using image-based templates for verifying the presence or absence of a warhead, or of the declared configuration of fissile material in storage, may be rejected out-of-hand as being too vulnerable to violation of information barrier (IB) principles. Development of a rigorous approach for generating and comparing reduced-information templates from images, and assessing the security, sensitivity, and robustness of verification using such templates, are needed to address these concerns. We discuss our efforts to develop such a rigorous approach based on a combination of image-feature extraction and encryption-utilizing hash functions to confirm proffered declarations, providing strong classified data security while maintaining high confidence for verification. The proposed work is focused on developing secure, robust, tamper-sensitive and automatic techniques that may enable the comparison of non-sensitive hashed image data outside an IB. It is rooted in research on so-called perceptual hash functions for image comparison, at the interface of signal/image processing, pattern recognition, cryptography, and information theory. Such perceptual or robust image hashing—which, strictly speaking, is not truly cryptographic hashing—has extensive application in content authentication and information retrieval, database search, and security assurance. Applying and extending the principles of perceptual hashing to imaging for arms control, we propose techniques that are sensitive to altering, forging and tampering of the imaged object yet robust and tolerant to content-preserving image distortions and noise. Ensuring that the information contained in the hashed image data (available out-of-IB) cannot be used to extract sensitive information about the imaged object is of primary concern. Thus the techniques are characterized by high unpredictability to guarantee security. We will present an assessment of the performance of our techniques with respect to security, sensitivity and robustness on the basis of a methodical and mathematically precise framework.

  16. Acoustic resonance spectroscopy for safeguards

    SciTech Connect (OSTI)

    Olinger, C.T. [Los Alamos National Lab., NM (United States)

    1994-12-31T23:59:59.000Z

    Acoustic resonance spectroscopy (ARS) nonintrusively assesses changes in a sealed item, such as a special nuclear material (SNM) container. The acoustic spectrum of a container is a function of its geometry, material of construction, and occupied volume and a function of the parameters of the contents, such as acoustic velocity, viscosity, and composition. Measuring the spectrum establishes a fingerprint for that item. Monitoring for changes in the fingerprint can be used to detect intrinsic changes in the contents or tampering. Spectra are obtained by inducing vibrations in a container at a given frequency with one transducer and detecting the vibrational response at that frequency with a second transducer. The excitation and detection frequency is then incremented until the desired frequency range is sampled. If desired, the signature can then be reduced to a series of resonant peaks, which facilitates the comparison of spectra for many applications. Required measurement time is typically 10 to 40 s, depending on the measurement range and resolution. Useful attributes of ARS are that spectra respond to various parameters differently, only a few seconds are required to perform an ARS measurement, and measurements can be performed without disturbing the container or its contents. Analysis for these applications of ARS is based on comparison of spectra from the same item taken at different times, so anomalies can be detected without any modeling of the system. However, some theoretical modeling can aid in interpreting spectra.

  17. Battery venting system and method

    DOE Patents [OSTI]

    Casale, T.J.; Ching, L.K.W.; Baer, J.T.; Swan, D.H.

    1999-01-05T23:59:59.000Z

    Disclosed herein is a venting mechanism for a battery. The venting mechanism includes a battery vent structure which is located on the battery cover and may be integrally formed therewith. The venting mechanism includes an opening extending through the battery cover such that the opening communicates with a plurality of battery cells located within the battery case. The venting mechanism also includes a vent manifold which attaches to the battery vent structure. The vent manifold includes a first opening which communicates with the battery vent structure opening and second and third openings which allow the vent manifold to be connected to two separate conduits. In this manner, a plurality of batteries may be interconnected for venting purposes, thus eliminating the need to provide separate vent lines for each battery. The vent manifold may be attached to the battery vent structure by a spin-welding technique. To facilitate this technique, the vent manifold may be provided with a flange portion which fits into a corresponding groove portion on the battery vent structure. The vent manifold includes an internal chamber which is large enough to completely house a conventional battery flame arrester and overpressure safety valve. In this manner, the vent manifold, when installed, lessens the likelihood of tampering with the flame arrester and safety valve. 8 figs.

  18. The Development of a Smart Distribution Grid Testbed for Integrated Information Management Systems

    SciTech Connect (OSTI)

    Lu, Ning; Du, Pengwei; Paulson, Patrick R.; Greitzer, Frank L.; Guo, Xinxin; Hadley, Mark D.

    2011-07-28T23:59:59.000Z

    This paper presents a smart distribution grid testbed to test or compare designs of integrated information management systems (I2MSs). An I2MS extracts and synthesizes information from a wide range of data sources to detect abnormal system behaviors, identify possible causes, assess the system status, and provide grid operators with response suggestions. The objective of the testbed is to provide a modeling environment with sufficient data sources for the I2MS design. The testbed includes five information layers and a physical layer; it generates multi-layer chronological data based on actual measurement playbacks or simulated data sets produced by the physical layer. The testbed models random hardware failures, human errors, extreme weather events, and deliberate tampering attempts to allow users to evaluate the performance of different I2MS designs. Initial results of I2MS performance tests showed that the testbed created a close-to-real-world environment that allowed key performance metrics of the I2MS to be evaluated.

  19. Design and Test of an Event Detector for the ReflectoActive Seals System

    SciTech Connect (OSTI)

    Stinson, Brad J [ORNL

    2006-05-01T23:59:59.000Z

    The purpose of this thesis was to research, design, develop and test a novel instrument for detecting fiber optic loop continuity and spatially locating fiber optic breaches. The work is for an active seal system called ReflectoActive Seals whose purpose is to provide real time container tamper indication. A Field Programmable Gate Array was used to implement a loop continuity detector and a spatial breach locator based on a high acquisition speed single photon counting optical time domain reflectometer. Communication and other control features were added in order to create a usable instrument that met defined requirements. A host graphical user interface was developed to illustrate system use and performance. The resulting device meets performance specifications by exhibiting a dynamic range of 27dB and a spatial resolution of 1.5 ft. The communication scheme used expands installation options and allows the device to communicate to a central host via existing Local Area Networks and/or the Internet.

  20. Design and Test of an Event Detector and Locator for the ReflectoActive Seals System

    SciTech Connect (OSTI)

    Stinson, Brad J [ORNL

    2006-06-01T23:59:59.000Z

    The purpose of this work was to research, design, develop and test a novel instrument for detecting fiber optic loop continuity and spatially locating fiber optic breaches. The work is for an active seal system called ReflectoActive{trademark} Seals whose purpose is to provide real time container tamper indication. A Field Programmable Gate Array was used to implement a loop continuity detector and a spatial breach locator based on a high acquisition speed single photon counting optical time domain reflectometer. Communication and other control features were added in order to create a usable instrument that met defined requirements. A host graphical user interface was developed to illustrate system use and performance. The resulting device meets performance specifications by exhibiting a dynamic range of 27dB and a spatial resolution of 1.5 ft. The communication scheme used expands installation options and allows the device to communicate to a central host via existing Local Area Networks and/or the Internet.

  1. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  2. US/Russian program in materials protection, control and accounting at the RRC Kurchatov Institute: 1997--1998

    SciTech Connect (OSTI)

    Sukhoruchkin, V.; Rumyantsev, A.; Shmelev, V. [RRC Kurchatov Inst., Moscow (Russian Federation)] [and others

    1998-12-31T23:59:59.000Z

    Six US Department of Energy Laboratories are carrying out a program of cooperation with the Russian Research Center Kurchatov Institute to improve nuclear material protection, control and accounting (MPC and A) at Kurchatov. In 1997--1998 the primary thrust of this program has been directed to Building 106, which houses a number of test reactors and critical facilities. Substantial improvements in physical protection, upgrades in the physical inventory taking procedures, installation of equipment for the computerized materials accounting system, and installation of nuclear material portal monitors and neutron-based measurement equipment are being carried out at this facility. Software for the computerized accounting system, named KI-MACS, has been developed at Kurchatov and the system has been fully integrated with the bar code printing and reading equipment, electronic scales, and nondestructive assay equipment provided under this program. Additional 1997--1998 activities at Kurchatov include continuation of a tamper indicating device program, vulnerability assessments of several facilities, hosting of a Russian-American Workshop on Fissile Material Control and Accountability at Critical Facilities, and the development of accounting procedures for transfers of nuclear materials between material balance areas.

  3. Tags and seals for controling nuclear materials, Arms control and nonproliferation technologies. Second quarter 1993

    SciTech Connect (OSTI)

    Staehle, G; Talaber, C; Stull, S; Moulthrop, P [eds.

    1993-12-31T23:59:59.000Z

    This issue of Arms Control and Nonproliferation Technologies summarizes demonstrations and addresses related topics. The first article, ``Basic Nuclear Material Control and Accountability Concepts as Might be Applied to the Uranium from the US-Russian HEU Purchase,`` describes safeguards sybsystems necessary for effective nuclear material safeguards. It also presents a general discussion on HEU-to-low-enrichment uranium (LEU) commingling processes and suggests applicable key measurement points. The second article, ``A Framework for Evaluating Tamper-Indicating-Device Technologies (TIDs),`` describes their uses, proper selection, and evaluation. The final three articles discuss the tags and seals applications and general characteristics of several nuclear material containers: the Type 30B uranium hexafluoride container, the AT-400R container, and the DOT Specification 6M container for SNM. Finally, the Appendix displays short descriptions and illustrations of seven tags and seals, including: the E-cup and wire seal, the python seal, the secure loop inspectable tag/seal (SLITS), bolt-and-loop type electronic identification devices, and the shrink-wrap seal.

  4. US/Russian laboratory-to-laboratory program in materials protection, control and accounting at the RRC Kurchatov Institute

    SciTech Connect (OSTI)

    Sukhoruchkin, V.; Roumiansev, A.; Shmelev, V. [Russian Research Centre Kurchatov Inst., Moscow (Russian Federation)] [and others

    1996-06-01T23:59:59.000Z

    Six US DOE Laboratories are carrying out a program of cooperation with the Russian Research Center Kurchatov Institute (RRC KI) to improve the capabilities and facilities in nuclear material protection, control, and accounting (MPC&A). In 1995, the primary emphasis of this program was the implementation of improved physical protection at a demonstration building at RRC KI, and the upgrading of the computerized MC&A system, diagnostic instrumentation, and physical inventory procedures at a critical assembly within this building. Work continues in 1996 at the demonstration building but now also has begun at the two Kurchatov buildings which constitute the Central Storage Facility (CSF). At this facility, there will be upgrades in the physical inventory taking procedures, a test and evaluation of gamma-ray isotopic measurements, evaluations of nuclear material portal monitors and neutron-based measurement equipment as well as development of an improved computerized materials accounting system, implementation of bar code printing and reading equipment, development of tamper indicating device program, and substantial improvements in physical protection. Also, vulnerability assessments begun in 1995 are being extended to additional high priority facilities at Kurchatov.

  5. US/Russian laboratory-to-laboratory program in materials protection, control and accounting at the RRC Kurchatov Institute

    SciTech Connect (OSTI)

    Sukhoruchkin, V.; Roumiantsev, A.; Shmelev, V. [RRC Kurchatov Inst., Moscow (Russian Federation)] [and others

    1996-09-01T23:59:59.000Z

    Six US Department of Energy Laboratories are carrying out a program of cooperation with the Russian Research Center Kurchatov Institute to improve nuclear material protection, control and accounting (MPC and A) at the Institute. In 1995 the primary emphasis of this program was the implementation of improved physical protection at a demonstration building at Kurchatov, and the upgrading the computerized materials accounting system, measurement instrumentation, and physical inventory procedures for a critical assembly within this building. Work continues in 1996 at this building but now also have begun at the two Kurchatov buildings which constitute the Central Storage Facility. At this facility, there will be upgrades in the physical inventory taking procedures, a test and evaluation of gamma-ray isotopic measurements, and evaluations of nuclear material portal monitors and neutron-based measurement equipment. There will also be implementation of an improved computerized materials accounting system which will include bar code printing and reading equipment, development of a tamper indicating device program, and substantial improvements in physical protection. Finally, vulnerability assessments begun in 1995 are being extended to additional high priority facilities at Kurchatov.

  6. Report on the US Program of Technical Assistance to Safeguards of the International Atomic Energy Agency (POTAS)

    SciTech Connect (OSTI)

    Not Available

    1981-05-01T23:59:59.000Z

    This document summarizes the work done under the US Program of Technical Assistance to IAEA Safeguards (POTAS), providing the US Government, IAEA, and others with a short review of the progress made in the program since its inception. Becaue of the size and complexity of the program, only major accomplishments are presented. These are grouped under the following categories: (1) equipment and standard which cover assay of irradiated and unirradiated nuclear materials, automatic data processing, and physical standards; (2) experts who are involved in technology transfer, training, system design, and safeguard information processing and analysis; (3) system studies which cover diversion hazard analysis, safeguards approaches and application, and inspection effort planning and forecasting; (4) techniques, procedures, and equipment evaluation; (5) training of IAEA inspectors and safeguards specialists from member states. The major achievement has been the provisions of safeguards equipment designed to be reliable, and tamper resistant, some of which have already been in use in the field by inspector or by IAEA staff members in Vienna. These are listed in a table. (AT)

  7. Remote Monitoring and Tracking of UF6 Cylinders Using Long-Range Passive Ultra-wideband (UWB) RFID Tags

    SciTech Connect (OSTI)

    Nekoogar, F; Dowla, F

    2007-06-06T23:59:59.000Z

    An IAEA Technical Meeting on Techniques for IAEA Verification of Enrichment Activities identified 'smart tags' as a technology that should be assessed for tracking and locating UF6 cylinders. Although there is vast commercial industry working on RFID systems, the vulnerabilities of commercial products are only beginning to emerge. Most of the commercially off-the-shelf (COTS) RFID systems operate in very narrow frequency bands, making them vulnerable to detection, jamming and tampering and also presenting difficulties when used around metals (i.e. UF6 cylinders). Commercial passive RFID tags have short range, while active RFID tags that provide long ranges have limited lifetimes. There are also some concerns with the introduction of strong (narrowband) radio frequency signals around radioactive and nuclear materials. Considering the shortcomings of commercial RFID systems, in their current form, they do not offer a promising solution for continuous monitoring and tracking of UF6 cylinders. In this paper, we identify the key challenges faced by commercial RFID systems for monitoring UF6 cylinders, and introduce an ultra-wideband approach for tag/reader communications that addresses most of the identified challenges for IAEA safeguards applications.

  8. The US Support Program to IAEA Safeguards Priority of Containment and Surveillance

    SciTech Connect (OSTI)

    Diaz,R.A.

    2008-06-13T23:59:59.000Z

    The United States Support Program (USSP) priority for containment and surveillance (US) focuses on maintaining or improving the reliability and cost-effectiveness of C/S systems for IAEA safeguards, expanding the number of systems that are unattended and remotely monitored, and developing verification methods that help streamline the on-site inspection process. Existing IAEA C/S systems have evolved to become complex, integrated systems, which may include active seals, nondestructive assay (NDA) instruments, video cameras, and other sensors. These systems operate autonomously. They send analytical data to IAEA headquarters where it can be reviewed. These systems present challenges to the goals of improved system performance, standardization, reliability, maintainability, documentation, and cost effectiveness. One critical lesson from past experiences is the need for cooperation and common objectives among the IAEA, the developer, and the facility operator, to create a successful, cost effective system. Recent USSP C/S activities include Rokkasho Reprocessing Plant safeguard systems, production of a new shift register, numerous vulnerability assessments of C/S systems, a conduit monitoring system which identifies tampering of IAEA conduit deployed in the field, fiber optic seal upgrades, unattended monitoring system software upgrades, next generation surveillance system which will upgrade existing camera systems, and support of the IAEA's development of the universal nondestructive assay data acquisition platform.

  9. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12T23:59:59.000Z

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  10. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01T23:59:59.000Z

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  11. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  12. Gas centrifuge enrichment plants inspection frequency and remote monitoring issues for advanced safeguards implementation

    SciTech Connect (OSTI)

    Boyer, Brian David [Los Alamos National Laboratory; Erpenbeck, Heather H [Los Alamos National Laboratory; Miller, Karen A [Los Alamos National Laboratory; Ianakiev, Kiril D [Los Alamos National Laboratory; Reimold, Benjamin A [Los Alamos National Laboratory; Ward, Steven L [Los Alamos National Laboratory; Howell, John [GLASGOW UNIV.

    2010-09-13T23:59:59.000Z

    Current safeguards approaches used by the IAEA at gas centrifuge enrichment plants (GCEPs) need enhancement in order to verify declared low enriched uranium (LEU) production, detect undeclared LEU production and detect high enriched uranium (BEU) production with adequate probability using non destructive assay (NDA) techniques. At present inspectors use attended systems, systems needing the presence of an inspector for operation, during inspections to verify the mass and {sup 235}U enrichment of declared cylinders of uranium hexafluoride that are used in the process of enrichment at GCEPs. This paper contains an analysis of how possible improvements in unattended and attended NDA systems including process monitoring and possible on-site destructive analysis (DA) of samples could reduce the uncertainty of the inspector's measurements providing more effective and efficient IAEA GCEPs safeguards. We have also studied a few advanced safeguards systems that could be assembled for unattended operation and the level of performance needed from these systems to provide more effective safeguards. The analysis also considers how short notice random inspections, unannounced inspections (UIs), and the concept of information-driven inspections can affect probability of detection of the diversion of nuclear material when coupled to new GCEPs safeguards regimes augmented with unattended systems. We also explore the effects of system failures and operator tampering on meeting safeguards goals for quantity and timeliness and the measures needed to recover from such failures and anomalies.

  13. Monitoring system including an electronic sensor platform and an interrogation transceiver

    DOE Patents [OSTI]

    Kinzel, Robert L.; Sheets, Larry R.

    2003-09-23T23:59:59.000Z

    A wireless monitoring system suitable for a wide range of remote data collection applications. The system includes at least one Electronic Sensor Platform (ESP), an Interrogator Transceiver (IT) and a general purpose host computer. The ESP functions as a remote data collector from a number of digital and analog sensors located therein. The host computer provides for data logging, testing, demonstration, installation checkout, and troubleshooting of the system. The IT transmits signals from one or more ESP's to the host computer to the ESP's. The IT host computer may be powered by a common power supply, and each ESP is individually powered by a battery. This monitoring system has an extremely low power consumption which allows remote operation of the ESP for long periods; provides authenticated message traffic over a wireless network; utilizes state-of-health and tamper sensors to ensure that the ESP is secure and undamaged; has robust housing of the ESP suitable for use in radiation environments; and is low in cost. With one base station (host computer and interrogator transceiver), multiple ESP's may be controlled at a single monitoring site.

  14. Battery venting system and method

    DOE Patents [OSTI]

    Casale, Thomas J. (Aurora, CO); Ching, Larry K. W. (Littleton, CO); Baer, Jose T. (Gaviota, CA); Swan, David H. (Monrovia, CA)

    1999-01-05T23:59:59.000Z

    Disclosed herein is a venting mechanism for a battery. The venting mechanism includes a battery vent structure which is located on the battery cover and may be integrally formed therewith. The venting mechanism includes an opening extending through the battery cover such that the opening communicates with a plurality of battery cells located within the battery case. The venting mechanism also includes a vent manifold which attaches to the battery vent structure. The vent manifold includes a first opening which communicates with the battery vent structure opening and second and third openings which allow the vent manifold to be connected to two separate conduits. In this manner, a plurality of batteries may be interconnected for venting purposes, thus eliminating the need to provide separate vent lines for each battery. The vent manifold may be attached to the battery vent structure by a spin-welding technique. To facilitate this technique, the vent manifold may be provided with a flange portion which fits into a corresponding groove portion on the battery vent structure. The vent manifold includes an internal chamber which is large enough to completely house a conventional battery flame arrester and overpressure safety valve. In this manner, the vent manifold, when installed, lessens the likelihood of tampering with the flame arrester and safety valve.

  15. Battery Vent Mechanism And Method

    DOE Patents [OSTI]

    Ching, Larry K. W. (Littleton, CO)

    2000-02-15T23:59:59.000Z

    Disclosed herein is a venting mechanism for a battery. The venting mechanism includes a battery vent structure which is located on the battery cover and may be integrally formed therewith. The venting mechanism includes an opening extending through the battery cover such that the opening communicates with a plurality of battery cells located within the battery case. The venting mechanism also includes a vent manifold which attaches to the battery vent structure. The vent manifold includes a first opening which communicates with the battery vent structure opening and second and third openings which allow the vent manifold to be connected to two separate conduits. In this manner, a plurality of batteries may be interconnected for venting purposes, thus eliminating the need to provide separate vent lines for each battery. The vent manifold may be attached to the battery vent structure by a spin-welding technique. To facilitate this technique, the vent manifold may be provided with a flange portion which fits into a corresponding groove portion on the battery vent structure. The vent manifold includes an internal chamber which is large enough to completely house a conventional battery flame arrester and overpressure safety valve. In this manner, the vent manifold, when installed, lessens the likelihood of tampering with the flame arrester and safety valve.

  16. Catalytic Hydroprocessing of Fast Pyrolysis Bio-oil from Pine Sawdust

    SciTech Connect (OSTI)

    Elliott, Douglas C.; Hart, Todd R.; Neuenschwander, Gary G.; Rotness, Leslie J.; Olarte, Mariefel V.; Zacher, Alan H.; Solantausta, Yrjo

    2012-06-01T23:59:59.000Z

    Catalytic hydroprocessing has been applied to the fast pyrolysis liquid product (bio-oil) from softwood biomass in a bench-scale continuous-flow fixed-bed reactor system. The intent of the research was to develop process technology to convert the bio-oil into a petroleum refinery feedstock to supplement fossil energy resources and to displace imported feedstock. This paper is focused on the process experimentation and product analysis. The paper describes the experimental methods used and relates the results of the product analyses. A range of operating parameters including temperature, and flow-rate were tested with bio-oil derived from pine wood as recovered and pyrolyzed in the pilot pyrolyzer of Metso Power in Tampere, Finland. Effects of time on stream and catalyst activity were assessed. Details of the process results were presented included product yields and hydrogen consumption. Detailed analysis of the products were provided including elemental composition and product descriptors such as density, viscosity and Total Acid Number (TAN). In summation, the paper provides an initial understanding of the efficacy of hydroprocessing as applied to the Finnish pine bio-oil.

  17. SYNTHESIS AND CHARACTERIZATION OF SMART FUNCTIONAL COATINGS BY CHEMICAL SOLUTION DEPOSITION METHODS

    SciTech Connect (OSTI)

    Mendez-Torres, A.

    2011-07-19T23:59:59.000Z

    New coating technology enables the fabrication of low cost structural health monitoring (SHM) and tamper indication devices that can be employed to strengthen national and international safeguards objectives. In particular, such innovations could serve the safeguards community by improving both the timeliness of detection and confidence in verification and monitoring. This work investigates the synthesis of functional surface coatings using chemical solutions deposition methods. Chemical solution deposition has recently received attention in the materials research community due to its unique advantages such as low temperature processing, high homogeneity of final products and the ability to fabricate materials with controlled surface properties and pore structures. The synthesis of functional coatings aimed at modifying the materials conductivity and optical properties was investigated by the incorporation of transition element (e.g. Cr{sup +3}) and rare earth (e.g. Er{sup +3}) serving as dopants in a polymer or gel matrix. The structural and morphological investigation of the as-deposited films was carried out using UV/Vis and photoluminescence (PL) spectroscopy. The as deposited coating was further investigated by scanning electron microscopy and energy dispersive x-ray microscopy.

  18. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  19. Sandia technology. Volume 13, number 2 Special issue : verification of arms control treaties.

    SciTech Connect (OSTI)

    Not Available

    1989-03-01T23:59:59.000Z

    Nuclear deterrence, a cornerstone of US national security policy, has helped prevent global conflict for over 40 years. The DOE and DoD share responsibility for this vital part of national security. The US will continue to rely on nuclear deterrence for the foreseeable future. In the late 1950s, Sandia developed satellite-borne nuclear burst detection systems to support the treaty banning atmospheric nuclear tests. This activity has continued to expand and diversify. When the Non-Proliferation Treaty was ratified in 1970, we began to develop technologies to protect nuclear materials from falling into unauthorized hands. This program grew and now includes systems for monitoring the movement and storage of nuclear materials, detecting tampering, and transmiting sensitive data securely. In the late 1970s, negotiations to further limit underground nuclear testing were being actively pursued. In less than 18 months, we fielded the National Seismic Station, an unattended observatory for in-country monitoring of nuclear tests. In the mid-l980s, arms-control interest shifted to facility monitoring and on-site inspection. Our Technical On-site Inspection Facility is the national test bed for perimeter and portal monitoring technology and the prototype for the inspection portal that was recently installed in the USSR under the Intermediate-Range Nuclear Forces accord. The articles in the special issue of Sundiu Technology describe some of our current contributions to verification technology. This work supports the US policy to seek realistic arms control agreements while maintaining our national security.

  20. Plume dynamics in femtosecond laser ablation of metals

    SciTech Connect (OSTI)

    Donnelly, T.; Lunney, J. G. [School of Physics, Trinity College Dublin, Dublin 2 (Ireland); Amoruso, S.; Bruzzese, R.; Wang, X. [Coherentia CNR-INFM and Dipartimento di Scienze Fisiche, Universita degli Studi di Napoli Fedrico II, Complesso Universitario di Monte S. Angelo, Via Cintia, I-80126, Napoli (Italy)

    2010-10-08T23:59:59.000Z

    In femtosecond laser ablation the plume has two components: a faster-moving plasma part and a slower nanoparticle plume which contains most of the ablated material. This paper describes the results of experiments to comprehensively characterize the plume in laser ablation of Ni with {approx_equal}300 fs pulses at 527 nm. Both single-pulse and double-pulse irradiation was used. The laser ablation depth was measured using white light interferometry. The dynamics of the plasma part of the ablation plume was measured using Langmuir ion probes. The shape of the overall ablation plume was recorded by depositing a thin film on a transparent substrate and measuring the thickness distribution. The expansion of the plasma plume is well described by the Anismov isentropic model of plume expansion. Just above the ablation threshold, the nanoparticle plume is also well described by the Anisimov expansion model. However, at higher fluence a wider plume is formed, perhaps due to the pressure exerted by plasma. For double-pulse ablation it is observed that as the second pulse is delayed beyond {approx_equal}20 ps the ablation depth is reduced and the ion yield is increased. This behaviour is due to reheating of the nascent plasma plume produced by the first pulse. This generates a pressure pulse that acts as a tamper which impedes the fragmentation and ablation of deeper layers of material.

  1. Best Practices for the Security of Radioactive Materials

    SciTech Connect (OSTI)

    Coulter, D.T.; Musolino, S.

    2009-05-01T23:59:59.000Z

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

  2. System Effectiveness

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    An effective risk assessment system is needed to address the threat posed by an active or passive insider who, acting alone or in collusion, could attempt diversion or theft of nuclear material. It is critical that a nuclear facility conduct a thorough self-assessment of the material protection, control, and accountability (MPC&A) system to evaluate system effectiveness. Self-assessment involves vulnerability analysis and performance testing of the MPC&A system. The process should lead to confirmation that mitigating features of the system effectively minimize the threat, or it could lead to the conclusion that system improvements or upgrades are necessary to achieve acceptable protection against the threat. Analysis of the MPC&A system is necessary to understand the limits and vulnerabilities of the system to internal threats. Self-assessment helps the facility be prepared to respond to internal threats and reduce the risk of theft or diversion of nuclear material. MSET is a self-assessment or inspection tool utilizing probabilistic risk assessment (PRA) methodology to calculate the system effectiveness of a nuclear facility's MPC&A system. MSET analyzes the effectiveness of an MPC&A system based on defined performance metrics for MPC&A functions based on U.S. and international best practices and regulations. A facility's MC&A system can be evaluated at a point in time and reevaluated after upgrades are implemented or after other system changes occur. The total system or specific subareas within the system can be evaluated. Areas of potential performance improvement or system upgrade can be assessed to determine where the most beneficial and cost-effective improvements should be made. Analyses of risk importance factors show that sustainability is essential for optimal performance. The analyses reveal where performance degradation has the greatest detrimental impact on total system risk and where performance improvements have the greatest reduction in system risk. The risk importance factors show the amount of risk reduction achievable with potential upgrades and the amount of risk reduction actually achieved after upgrades are completed. Applying the risk assessment tool gives support to budget prioritization by showing where budget support levels must be sustained for MC&A functions most important to risk. Results of the risk assessment are also useful in supporting funding justifications for system improvements that significantly reduce system risk.

  3. EVALUATION METHODOLOGY FOR PROLIFERATION RESISTANCE AND PHYSICAL PROTECTION OF GENERATION IV NUCLEAR ENERGY SYSTEMS: AN OVERVIEW.

    SciTech Connect (OSTI)

    BARI, R.; ET AL.

    2006-03-01T23:59:59.000Z

    This paper provides an overview of the methodology approach developed by the Generation IV International Forum Expert Group on Proliferation Resistance & Physical Protection for evaluation of Proliferation Resistance and Physical Protection robustness of Generation IV nuclear energy systems options. The methodology considers a set of alternative systems and evaluates their resistance or robustness to a collection of potential threats. For the challenges considered, the response of the system to these challenges is assessed and expressed in terms of outcomes. The challenges to the system are given by the threats posed by potential proliferant States and sub-national adversaries on the nuclear systems. The characteristics of the Generation IV systems, both technical and institutional, are used to evaluate their response to the threats and determine their resistance against the proliferation threats and robustness against sabotage and theft threats. System response encompasses three main elements: (1) System Element Identification. The nuclear energy system is decomposed into smaller elements (subsystems) at a level amenable to further analysis. (2) Target Identification and Categorization. A systematic process is used to identify and select representative targets for different categories of pathways, within each system element, that actors (proliferant States or adversaries) might choose to use or attack. (3) Pathway Identification and Refinement. Pathways are defined as potential sequences of events and actions followed by the proliferant State or adversary to achieve its objectives (proliferation, theft or sabotage). For each target, individual pathway segments are developed through a systematic process, analyzed at a high level, and screened where possible. Segments are connected into full pathways and analyzed in detail. The outcomes of the system response are expressed in terms of PR&PP measures. Measures are high-level characteristics of a pathway that include information important to the evaluation methodology users and to the decisions of a proliferant State or adversary. They are first evaluated for segments and then aggregated for complete pathways. Results are aggregated as appropriate to permit pathway comparisons and system assessment. The paper highlights the current achievements in the development of the Proliferation Resistance and Physical Protection Evaluation Methodology. The way forward is also briefly presented together with some conclusions.

  4. Evaluation Methodology For Proliferation Resistance And Physical Protection Of Generation IV Nuclear Energy Systems: An Overview

    SciTech Connect (OSTI)

    T. Bjornard; R. Bari; R. Nishimura; P. Peterson; J. Roglans; D. Bley; J. Cazalet; G.G.M. Cojazzi; P. Delaune; M. Golay; G. Rendad; G. Rochau; M. Senzaki; I. Therios; M. Zentner

    2006-05-01T23:59:59.000Z

    This paper provides an overview of the methodology approach developed by the Generation IV International Forum Expert Group on Proliferation Resistance & Physical Protection for evaluation of Proliferation Resistance and Physical Protection robustness of Generation IV nuclear energy systems options. The methodology considers a set of alternative systems and evaluates their resistance or robustness to a collection of potential threats. For the challenges considered, the response of the system to these challenges is assessed and expressed in terms of outcomes. The challenges to the system are given by the threats posed by potential proliferant States and sub-national adversaries on the nuclear systems. The characteristics of the Generation IV systems, both technical and institutional, are used to evaluate their response to the threats and determine their resistance against the proliferation threats and robustness against sabotage and theft threats. System response encompasses three main elements: 1.System Element Identification. The nuclear energy system is decomposed into smaller elements (subsystems) at a level amenable to further analysis. 2.Target Identification and Categorization. A systematic process is used to identify and select representative targets for different categories of pathways, within each system element, that actors (proliferant States or adversaries) might choose to use or attack. 3.Pathway Identification and Refinement. Pathways are defined as potential sequences of events and actions followed by the proliferant State or adversary to achieve its objectives (proliferation, theft or sabotage). For each target, individual pathway segments are developed through a systematic process, analyzed at a high level, and screened where possible. Segments are connected into full pathways and analyzed in detail. The outcomes of the system response are expressed in terms of PR&PP measures. Measures are high-level characteristics of a pathway that include information important to the evaluation methodology users and to the decisions of a proliferant State or adversary. They are first evaluated for segments and then aggregated for complete pathways. Results are aggregated as appropriate to permit pathway comparisons and system assessment. The paper highlights the current achievements in the development of the Proliferation Resistance and Physical Protection Evaluation Methodology. The way forward is also briefly presented together with some conclusions.

  5. 1996 NRC annual report. Volume 13

    SciTech Connect (OSTI)

    NONE

    1997-10-01T23:59:59.000Z

    This 22nd annual report of the US Nuclear Regulatory Commission (NRC) describes accomplishments, activities, and plans made during Fiscal Year 1996 (FH 1996)--October 1, 1995, through September 30, 1996. Significant activities that occurred early in FY 1997 are also described, particularly changes in the Commission and organization of the NRC. The mission of the NRC is to ensure that civilian uses of nuclear materials in the US are carried out with adequate protection of public health and safety, the environment, and national security. These uses include the operation of nuclear power plants and fuel cycle plants and medical, industrial, and research applications. Additionally, the NRC contributes to combating the proliferation of nuclear weapons material worldwide. The NRC licenses and regulates commercial nuclear reactor operations and research reactors and other activities involving the possession and use of nuclear materials and wastes. It also protects nuclear materials used in operation and facilities from theft or sabotage. To accomplish its statutorily mandated regulatory mission, the NRC issues rules and standards, inspects facilities and operations, and issues any required enforcement actions.

  6. Nuclear fission and nuclear safeguards: Common technologies and challenges

    SciTech Connect (OSTI)

    Keepin, G.R.

    1989-01-01T23:59:59.000Z

    Nuclear fission and nuclear safeguards have much in common, including the basic physical phenomena and technologies involved as well as the commitments and challenges posed by expanding nuclear programs in many countries around the world. The unique characteristics of the fission process -- such as prompt and delayed neutron and gamma ray emission -- not only provide the means of sustaining and controlling the fission chain reaction, but also provide unique ''signatures'' that are essential to quantitative measurement and effective safeguarding of key nuclear materials (notably /sup 239/Pu and /sup 235/U) against theft, loss, or diversion. In this paper, we trace briefly the historical emergence of safeguards as an essential component of the expansion of the nuclear enterprise worldwide. We then survey the major categories of passive and active nondestructive assay techniques that are currently in use or under development for rapid, accurate measurement and verification of safe-guarded nuclear materials in the many forms in which they occur throughout the nuclear fuel cycle. 23 refs., 14 figs.

  7. Termination of Safeguards for Accountable Nuclear Materials at the Idaho National Laboratory

    SciTech Connect (OSTI)

    Michael Holzemer; Alan Carvo

    2012-04-01T23:59:59.000Z

    Termination of safeguards ends requirements of Nuclear Material Control and Accountability (MC&A) and thereby removes the safeguards basis for applying physical protection requirements for theft and diversion of nuclear material, providing termination requirements are met as described. Department of Energy (DOE) M 470.4 6 (Nuclear Material Control and Accountability [8/26/05]) stipulates: 1. Section A, Chapter I (1)( q) (1): Safeguards can be terminated on nuclear materials provided the following conditions are met: (a) 'If the material is special nuclear material (SNM) or protected as SNM, it must be attractiveness level E and have a measured value.' (b) 'The material has been determined by DOE line management to be of no programmatic value to DOE.' (c) 'The material is transferred to the control of a waste management organization where the material is accounted for and protected in accordance with waste management regulations. The material must not be collocated with other accountable nuclear materials.' Requirements for safeguards termination depend on the safeguards attractiveness levels of the material. For attractiveness level E, approval has been granted from the DOE Idaho Operations Office (DOE ID) to Battelle Energy Alliance, LLC (BEA) Safeguards and Security (S&S). In some cases, it may be necessary to dispose of nuclear materials of attractiveness level D or higher. Termination of safeguards for such materials must be approved by the Departmental Element (this is the DOE Headquarters Office of Nuclear Energy) after consultation with the Office of Security.

  8. PLANNING AND COORDINATION OF ACTIVITIES SUPPORTING THE RUSSIAN SYSTEM OF CONTROL AND ACCOUNTING OF NUCLEAR MATERIALS AT ROSATOM FACILITIES IN THE FRAMEWORK OF THE U.S.-RUSSIAN COOPERATION.

    SciTech Connect (OSTI)

    SVIRIDOVA, V.V.; ERASTOV, V.V.; ISAEV, N.V.; ROMANOV, V.A.; RUDENKO, V.S.; SVIRIDOV, A.S.; TITOV, G.V.; JENSEN, B.; NEYMOTIN, L.; SANDERS, J.

    2005-05-16T23:59:59.000Z

    The MC&A Equipment and Methodological Support Strategic Plan (MEMS SP) for implementing modern MC&A equipment and methodologies at Rosatom facilities has been developed within the framework of the U.S.-Russian MPC&A Program. This plan developed by the Rosatom's Russian MC&A Equipment and Methodologies (MEM) Working Group and is coordinated by that group with support and coordination provided by the MC&A Measurements Project, Office of National Infrastructure and Sustainability, US DOE. Implementation of different tasks of the MEMS Strategic Plan is coordinated by Rosatom and US-DOE in cooperation with different U.S.-Russian MC&A-related working groups and joint site project teams. This cooperation allows to obtain and analyze information about problems, current needs and successes at Rosatom facilities and facilitates solution of the problems, satisfying the facilities' needs and effective exchange of expertise and lessons learned. The objective of the MEMS Strategic Plan is to enhance effectiveness of activities implementing modern equipment and methodologies in the Russian State MC&A system. These activities are conducted within the joint Russian-US MPC&A program aiming at reduction of possibility for theft or diversion of nuclear materials and enhancement of control of nuclear materials.

  9. Gamma watermarking

    DOE Patents [OSTI]

    Ishikawa, Muriel Y.; Wood, Lowell L.; Lougheed, Ronald W.; Moody, Kenton J.; Wang, Tzu-Fang

    2004-05-25T23:59:59.000Z

    A covert, gamma-ray "signature" is used as a "watermark" for property identification. This new watermarking technology is based on a unique steganographic or "hidden writing" digital signature, implemented in tiny quantities of gamma-ray-emitting radioisotopic material combinations, generally covertly emplaced on or within an object. This digital signature may be readily recovered at distant future times, by placing a sensitive, high energy-resolution gamma-ray detecting instrument reasonably precisely over the location of the watermark, which location may be known only to the object's owner; however, the signature is concealed from all ordinary detection means because its exceedingly low level of activity is obscured by the natural radiation background (including the gamma radiation naturally emanating from the object itself, from cosmic radiation and material surroundings, from human bodies, etc.). The "watermark" is used in object-tagging for establishing object identity, history or ownership. It thus may serve as an aid to law enforcement officials in identifying stolen property and prosecuting theft thereof. Highly effective, potentially very low cost identification-on demand of items of most all types is thus made possible.

  10. EMCAS, an evaluation methodology for safeguards and security systems

    SciTech Connect (OSTI)

    Eggers, R.F.; Giese, E.W.; Bichl, F.J.

    1987-07-01T23:59:59.000Z

    EMCAS is an evaluation methodology for safeguards and security systems. It provides a score card of projected or actual system performance for several areas of system operation. In one area, the performance of material control and accounting and security systems, which jointly defend against the insider threat to divert or steal special nuclear material (SNM) using stealth and deceit, is evaluated. Time-dependent and time-independent risk equations are used for both diversion and theft risk calculations. In the case of loss detection by material accounting, a detailed timeliness model is provided to determine the combined effects of loss detection sensitivity and timeliness on the overall effectiveness of the material accounting detection procedure. Calculated risks take into account the capabilities of process area containment/surveillance, material accounting mass balance tests, and physical protection barriers and procedures. In addition, EMCAS evaluates the Material Control and Accounting (MCandA) System in the following areas: (1) system capability to detect errors in the official book inventory of SNM, using mass balance accounting methods, (2) system capability to prevent errors from entering the nuclear material data base during periods of operation between mass balance tests, (3) time to conduct inventories and resolve alarms, and (4) time lost from production to carry out material control and accounting loss detection activities.

  11. EMCAS: An evaluation methodology for safeguards and security systems

    SciTech Connect (OSTI)

    Eggers, R.F.; Giese, E.W.; Bichl, F.J.

    1987-01-01T23:59:59.000Z

    EMCAS is an evaluation methodology for safeguards and security systems. It provides a score card of projected or actual system performance for several areas of system operation. In one area, the performance of material control and accounting and security systems, which jointly defend against the insider threat to divert or steal special nuclear material (SNM) using stealth and deceit, is evaluated. Time-dependent and time-independent risk equations are used for both diversion and theft risk calculations. In the case of loss detection by material accounting, a detailed timeliness model is provided to determine the combined effects of loss detection sensitivity and timeliness on the overall effectiveness of the material accounting detection procedure. Calculated risks take into account the capabilities of process area containment/surveillance, material accounting mass balance tests, and physical protection barriers and procedures. In addition, EMCAS evaluates the Material Control and Accounting (MC and A) System in the following areas: (1) system capability to detect errors in the official book inventory of SNM, using mass balance accounting methods, (2) system capability to prevent errors from entering the nuclear material data base during periods of operation between mass balance tests, (3) time to conduct inventories and resolve alarms, and (4) time lost from production to carry out material control and accounting loss detection activities. 3 figs., 5 tabs.

  12. Evaluating safeguard effectiveness against violent insiders

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Fortney, D.S.

    1990-07-16T23:59:59.000Z

    The threat posed by a violent insiders presents a major challenge to safeguards managers. These insiders, in addition to their ability to exploit their special authorities, access, and knowledge of facility operations and safeguards, could use violence to defeat safeguards components and personnel. In protecting against theft of special nuclear material, facilities have emphasized the use of perimeter protection and physical barriers to protect against attacks by an outsider adversary group. Recently emphasis has begun to shift toward the implementation of hardware and procedural measures to protect against nonviolent insiders. Approaches are also needed to help assess the effectiveness of protection against those insiders who are willing to use violence. In this paper we describe an approach we're developing for dealing with violent insiders. We begin by categorizing insiders according to whether they are active or passive, rational or irrational, and whether they are willing to use force against safeguards components or coworkers. We define characteristics of each category, and describe the extent to which each category is adequately modelled by existing evaluation tools. We also discuss several modelling issues posed by active insiders, including: entry of contraband; reluctance to use violence; neutralization of insiders; and the ability to switch modes of attack between force, stealth, and deceit. 5 refs., 2 figs.

  13. Modelling and evaluating against the violent insider

    SciTech Connect (OSTI)

    Fortney, D.S.; Al-Ayat, R.A.; Saleh, R.A.

    1991-07-01T23:59:59.000Z

    The violent insider threat poses a special challenge to facilities protecting special nuclear material from theft or diversion. These insiders could potentially behave as nonviolent insiders to deceitfully defeat certain safeguards elements and use violence to forcefully defeat hardware or personnel. While several vulnerability assessment tools are available to deal with the nonviolent insider, very limited effort has been directed to developing analysis tools for the violent threat. In this paper, we present an approach using the results of a vulnerability assessment for nonviolent insiders to evaluate certain violent insider scenarios. Since existing tools do not explicitly consider violent insiders, the approach is intended for experienced safeguards analysts and relies on the analyst to brainstorm possible violent actions, to assign detection probabilities, and to ensure consistency. We then discuss our efforts in developing an automated tool for assessing the vulnerability against those violent insiders who are willing to use force against barriers, but who are unwilling to kill or be killed. Specifically, we discuss our efforts in developing databases for violent insiders penetrating barriers, algorithms for considering the entry of contraband, and modelling issues in considering the use of violence.

  14. Infrastructure: A technology battlefield in the 21st century

    SciTech Connect (OSTI)

    Drucker, H.

    1997-12-31T23:59:59.000Z

    A major part of technological advancement has involved the development of complex infrastructure systems, including electric power generation, transmission, and distribution networks; oil and gas pipeline systems; highway and rail networks; and telecommunication networks. Dependence on these infrastructure systems renders them attractive targets for conflict in the twenty-first century. Hostile governments, domestic and international terrorists, criminals, and mentally distressed individuals will inevitably find some part of the infrastructure an easy target for theft, for making political statements, for disruption of strategic activities, or for making a nuisance. The current situation regarding the vulnerability of the infrastructure can be summarized in three major points: (1) our dependence on technology has made our infrastructure more important and vital to our everyday lives, this in turn, makes us much more vulnerable to disruption in any infrastructure system; (2) technologies available for attacking infrastructure systems have changed substantially and have become much easier to obtain and use, easy accessibility to information on how to disrupt or destroy various infrastructure components means that almost anyone can be involved in this destructive process; (3) technologies for defending infrastructure systems and preventing damage have not kept pace with the capability for destroying such systems. A brief review of these points will illustrate the significance of infrastructure and the growing dangers to its various elements.

  15. Savannah River Site delayed neutron instruments for safeguards measurements. Revision 1

    SciTech Connect (OSTI)

    Studley, R.V.

    1992-12-31T23:59:59.000Z

    The Savannah River Site (SRS) includes a variety of nuclear production facilities that, since 1953, have processed special nuclear materials (SNM) including highly-enriched uranium (>90% {sup 235}U), recycled enriched uranium ({approximately}50% {sup 235}U + 40% {sup 236}U), low burnup plutonium (> 90% {sup 239}Pu + < 6% {sup 240}Pu ) and several other nuclear materials such as heat source plutonium ({sup 238}Pu). DOE Orders, primarily 5633.3, require all nuclear materials to be safeguarded through accountability and material control. Accountability measurements determine the total amount of material in a facility, balancing inventory changes against receipts and shipments, to provide assurance (delayed) that all material was present. Material control immediately detects or deters theft or diversion by assuring materials remain in assigned locations or by impeding unplanned movement of materials within or from a material access area. Goals for accountability or material control, and, therefore, the design of measurement systems, are distinctly different. Accountability measurements are optimized for maximum precision and accuracy, usually for large amounts of special nuclear material. Material control measurements are oriented more toward security features and often must be optimized for sensitivity, to detect small amounts of materials where none should be.

  16. Prediction of the Virgo axis anisotropy: CMB radiation illuminates the nature of things

    E-Print Network [OSTI]

    Simon Berkovich

    2005-09-25T23:59:59.000Z

    Recent findings of the anisotropy in the Cosmic Microwave Background (CMB) radiation are confusing for standard cosmology. Remarkably, this fact has been predicted several years ago in the framework of our model of the physical world. Moreover, in exact agreement with our prediction the CMB has a preferred direction towards the Virgo Cluster. The transpired structure of the CMB shows workings of the suggested model of the physical world. Comprising the information processes of Nature, this model presents a high-tech version of the previous low-tech developments for mechanical ether and quantum vacuum. In the current model, the phenomenon of Life turns up as a collective effect on the "Internet of the Physical Universe" using DNA structures for access codes. Most convincingly, this construction points to a harmful analogy with so-called "identity theft" - improper manipulations with DNA of individual organisms can destroy these organisms from a remote location without any physical contact. Appearing incredible, such a possibility creates a superlative Experimentum Crucis. In a broad sense, this surmised biological effect is intimately related to the cosmological prediction of the structurization of the CMB, but it is more compelling.

  17. Unique Construction and Social Experiences in Residential Remediation Sites - 13423

    SciTech Connect (OSTI)

    Jung, Paul; Scarborough, Rebecca [Sevenson Environmental Services, Inc. 2749 Lockport Road, Niagara Falls, NY 14305 (United States)] [Sevenson Environmental Services, Inc. 2749 Lockport Road, Niagara Falls, NY 14305 (United States)

    2013-07-01T23:59:59.000Z

    Sevenson Environmental Services, Inc., (Sevenson) has performed several radiological remediation projects located in residential urban areas. Over the course of these projects, there has been a wide variety of experiences encountered from construction related issues to unique social situations. Some of the construction related issues included the remediation of interior basements where contaminated material was located under the footers of the structure or was used in the mortar between cinder block or field stone foundations. Other issues included site security, maintaining furnaces or other utilities, underpinning, backfilling and restoration. In addition to the radiological hazards associated with this work there were occupational safety and industrial hygiene issues that had to be addressed to ensure the safety and health of neighboring properties and residents. The unique social situations at these job sites have included arson, theft/stolen property, assault/battery, prostitution, execution of arrest warrants for residents, discovery of drugs and paraphernalia, blood borne pathogens, and unexploded ordnance. Some of these situations have become a sort of comical urban legend throughout the organization. One situation had historical significance, involving the demolition of a house to save a tree older than the Declaration of Independence. All of these projects typically involve the excavation of early 20. century items such as advertisement signs, various old bottles (milk, Listerine, perfume, whisky) and other miscellaneous common trash items. (authors)

  18. Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities

    SciTech Connect (OSTI)

    Wilkey, D.D.

    1995-09-01T23:59:59.000Z

    This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

  19. Towards a Standard for Highly Secure SCADA Systems

    SciTech Connect (OSTI)

    Carlson, R.

    1998-09-25T23:59:59.000Z

    The critical energy inkstructures include gas, OL and electric power. These Mrastructures are complex and interdependent nmvorks that are vital to the national secwiy and social well being of our nation. Many electric power systems depend upon gas and oil, while fossil energy delive~ systems depend upon elecnic power. The control mechanisms for these Mrastructures are often referred to as SCADA (Supmivry CkmdandDaU Ac@itz&z) systems. SCADA systems provide remote monitoring and centralized control for a distributed tmnsportation infmsmucture in order to facilitate delivery of a commodi~. AIthough many of the SCADA concepts developed in this paper can be applied to automotive mmsponation systems, we will use transportation to refer to the movement of electrici~, gas, and oil. \\ Recently, there have been seveml reports suggesting that the widespread and increasing use of SCADA for control of energy systems provides an increasing opportuni~ for an advers~ to cause serious darnage to the energy inbstmcturei~. This damage could arise through cyber infiltration of the SCADA networks, by physically tampering with the control networks, or through a combination of both means. SCADA system threats decompose into cyber and physical threats. One solution to the SCADA security problem is to design a standard for a highly secure KA.DA system that is both cyber, and physdly secure. Not all-physical threats are possible to guard again% but of those threats that are, high security SCADA provides confidence that the system will continue to operate in their presence. One of the most important problems in SCADA securi~ is the relationship between the cyber and physical vulnerabilities. Cyber intrusion increases physical Vulnerabilities, while in the dual problem physical tampering increases cyber vulnerabilit.ies. There is potential for feedback and the precise dynamics need to be understood. As a first step towards a stan~ the goal of this paper is to facilitate a discussion of the requirements analysis for a highly secure SCADA system. The fi-arnework for the discussion consists of the identification of SCADA security investment areas coupled with the tradeoffs that will force compromises in the solution. For example, computational and bandwidth requirements of a security standard could force the replacement of entire SCADA systems. The requirements for a real-time response in a cascading electric power failure could pose limitations on authentication and encryption mechanisms. The shortest path to the development of a high securi~ SC.ADA standard will be achieved by leveraging existing standards efforts and ensuring that security is being properly addressed in those standards. The Utility Communications Architecture 2.o (UC@, for real-time utili~ decision control, represents one such standard. The development of a SCADA secwiy specification is a complex task that will benefit from a systems engineering approach.

  20. Implementation of a Dual Containment/Surveillance System utilizing scene-change detection and radio frequency technology

    SciTech Connect (OSTI)

    FITZGERALD, ERIC; KOENIG, RICHARD

    2005-06-27T23:59:59.000Z

    This paper will examine the implementation of scene-change detection and radio frequency technology within a Dual Containment/Surveillance (C/S) System. Additionally, this paper will examine the human performance factors in the operation of these systems. Currently, Westinghouse Savannah River Company utilizes the Continuous Item Monitoring and Surveillance System (CIMS) in the performance of Dual C/S to monitor special nuclear materials within International Atomic Energy Agency (IAEA) Safeguards and Domestic Safeguards. CIMS is comprised of the Material Monitoring System (MMS) (R), a multi-media electronic surveillance system developed by Sandia National Laboratory which incorporates the use of active seals commonly called Radio Frequency Tamper Indicating Devices (RFTIDs), NT Vision (R) as developed by Los Alamos National Laboratory, a Microsoft Windows NT (R) based operating system providing for domestic scene-change detection and the Digital Multi-Camera Optical Surveillance System (DMOS) (R) which provides scene-change detection for IAEA. Although this paper will focus on the implementation of Dual C/S utilizing the Continuous Item Monitoring and Surveillance System, the necessity for a thorough review of Safeguards and Security requirements with organizations and personnel having minimal to no prior MPC&A training will also be covered. Successful Dual C/S implementation plans must consider not only system design and failure modes, but must also be accompanied with the appropriate ''mind shift'' within operations and technical personnel. This is required to ensure completion of both physical and electronic activities, and system design changes are performed conscientiously and with full awareness of MPC&A requirements.

  1. Evaluation of a RF-Based Approach for Tracking UF6 Cylinders at a Uranium Enrichment Plant

    SciTech Connect (OSTI)

    Pickett, Chris A [ORNL] [ORNL; Younkin, James R [ORNL] [ORNL; Kovacic, Donald N [ORNL] [ORNL; Laughter, Mark D [ORNL] [ORNL; Hines, Jairus B [ORNL] [ORNL; Boyer, Brian [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL); Martinez, B. [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL)

    2008-01-01T23:59:59.000Z

    Approved industry-standard cylinders are used globally to handle and store uranium hexafluoride (UF{sub 6}) feed, product, tails, and samples at uranium enrichment plants. The International Atomic Energy Agency (IAEA) relies on time-consuming physical inspections to verify operator declarations and detect possible diversion of UF{sub 6}. Development of a reliable, automated, and tamper-resistant system for near real-time tracking and monitoring UF{sub 6} cylinders (as they move within an enrichment facility) would greatly improve the inspector function. This type of system can reduce the risk of false or misreported cylinder tare weights, diversion of nuclear material, concealment of excess production, utilization of undeclared cylinders, and misrepresentation of the cylinders contents. This paper will describe a proof-of-concept approach that was designed to evaluate the feasibility of using radio frequency (RF)-based technologies to track individual UF{sub 6} cylinders throughout a portion of their life cycle, and thus demonstrate the potential for improved domestic accountability of materials, and a more effective and efficient method for application of site-level IAEA safeguards. The evaluation system incorporates RF-based identification devices (RFID) which provide a foundation for establishing a reliable, automated, and near real-time tracking system that can be set up to utilize site-specific, rules-based detection algorithms. This paper will report results from a proof-of-concept demonstration at a real enrichment facility that is specifically designed to evaluate both the feasibility of using RF to track cylinders and the durability of the RF equipment to survive the rigors of operational processing and handling. The paper also discusses methods for securely attaching RF devices and describes how the technology can effectively be layered with other safeguard systems and approaches to build a robust system for detecting cylinder diversion. Additionally, concepts for off-site tracking of cylinders are described.

  2. USE OF MAILBOX APPROACH, VIDEO SURVEILLANCE, AND SHORT-NOTICE RANDOM INSPECTIONS TO ENHANCE DETECTION OF UNDECLARED LEU PRODUCTION AT GAS CENTRIFUGE ENRICHMENT PLANTS.

    SciTech Connect (OSTI)

    BOYER, B.D.; GORDON, D.M.; JO, J.

    2006-07-16T23:59:59.000Z

    Current safeguards approaches used by the IAEA at gas centrifuge enrichment plants (GCEPs) need enhancement in order to detect undeclared LEU production with adequate detection probability. ''Mailbox'' declarations have been used in the last two decades to verify receipts, production, and shipments at some bulk-handling facilities (e.g., fuel-fabrication plants). The operator declares the status of his plant to the IAEA on a daily basis using a secure ''Mailbox'' system such as a secure tamper-resistant computer. The operator agrees to hold receipts and shipments for a specified period of time, along with a specified number of annual inspections, to enable inspector access to a statistically large enough population of UF{sub 6} cylinders and fuel assemblies to achieve the desired detection probability. The inspectors can access the ''Mailbox'' during randomly timed inspections and then verify the operator's declarations for that day. Previously, this type of inspection regime was considered mainly for verifying the material balance at fuel-fabrication, enrichment, and conversion plants. Brookhaven National Laboratory has expanded the ''Mailbox'' concept with short-notice random inspections (SNRIs), coupled with enhanced video surveillance, to include declaration and verification of UF{sub 6} cylinder operational data to detect activities associated with undeclared LEU production at GCEPs. Since the ''Mailbox'' declarations would also include data relevant to material-balance verification, these randomized inspections would replace the scheduled monthly interim inspections for material-balance purposes; in addition, the inspectors could simultaneously perform the required number of Limited-Frequency Unannounced Access (LFUA) inspections used for HEU detection. This approach would provide improved detection capabilities for a wider range of diversion activities with not much more inspection effort than at present.

  3. Test and evaluation of computerized nuclear material accounting methods. Final report

    SciTech Connect (OSTI)

    NONE

    1995-12-31T23:59:59.000Z

    In accordance with the definition of a Material Balance Area (MBA) as a well-defined geographical area involving an Integral operation, the building housing the BFS-1 and BFS-1 critical facilities is considered to consist of one MBA. The BFS materials are in the form of small disks clad in stainless steel and each disk with nuclear material has its own serial number. Fissile material disks in the BFS MBA can be located at three key monitoring points: BFS-1 facility, BFS-2 facility and main storage of BFS fissile materials (storage 1). When used in the BFS-1 or BFS-2 critical facilities, the fissile material disks are loaded in tubes (fuel rods) forming critical assembly cores. The following specific features of the BFS MBA should be taken into account for the purpose of computerized accounting of nuclear material: (1) very large number of nuclear material items (about 70,000 fissile material items); and (2) periodically very intensive shuffling of nuclear material items. Requirements for the computerized system are determined by basic objectives of nuclear material accounting: (1) providing accurate information on the identity and location of all items in the BFS material balance area; (2) providing accurate information on location and identity of tamper-indicating devices; (3) tracking nuclear material inventories; (4) issuing periodic reports; (5) assisting with the detection of material gains or losses; (6) providing a history of nuclear material transactions; (7) preventing unauthorized access to the system and data falsification. In August 1995, the prototype computerized accounting system was installed on the BFS facility for trial operation. Information on two nuclear material types was entered into the data base: weapon-grade plutonium metal and 36% enriched uranium dioxide. The total number of the weapon-grade plutonium disks is 12,690 and the total number of the uranium dioxide disks is 1,700.

  4. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    SciTech Connect (OSTI)

    Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

    2012-06-04T23:59:59.000Z

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

  5. Nuclear materials control and accountability criteria for upgrades measures

    SciTech Connect (OSTI)

    Erkkila, B.H.; Hatcher, C.R.

    1998-11-01T23:59:59.000Z

    As a result of major political and societal changes in the past several years, methods of nuclear material control may no longer be as effective as in the past in Russia, the Newly Independent States (NIS), and the Baltic States (BS). The objective of the Department of Energy (DOE) Material Protection, Control, and Accounting Program (MPC and A) is to reduce the threat of nuclear proliferation by collaborating with Russia, NIS, and BS governments to promote western-style MPC and A. This cooperation will improve the MPC and A on all weapons useable nuclear materials and will establish a sustainable infrastructure to provide future support and maintenance for these technology-based improvements. Nuclear materials of proliferation concern include materials of the types and quantities that can be most easily and directly used in a nuclear weapon. Sabotage of nuclear material is an event of great concern and potentially disastrous consequences to both the US and the host country. However, sabotage is currently beyond the scope of program direction and cannot be used to justify US-funded MPC and A upgrades. Judicious MPC and A upgrades designed to protect against insider and outsider theft scenarios would also provide addition, although not comprehensive, protection against saboteurs. This paper provides some suggestions to establish consistency in prioritizing system-enhancement efforts at nuclear material facilities. The suggestions in this paper are consistent with DOE policy and directions and should be used as a supplement to any policy directives issued by NN-40, DOE Russia/NIS Task Force.

  6. Security-by-design handbook.

    SciTech Connect (OSTI)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01T23:59:59.000Z

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  7. The acquisition of dangerous biological materials :

    SciTech Connect (OSTI)

    Aceto, Donato Gonzalo; Astuto-Gribble, Lisa M.; Gaudioso, Jennifer M.

    2007-11-01T23:59:59.000Z

    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents can potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.

  8. Illicit Trafficking of Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva [Div. of Physics and Biophysics, University of Salzburg Hellbrunnerstr. 34, A 5020 Salzburg (Austria)

    2008-08-07T23:59:59.000Z

    Natural radionuclides have been subject to trafficking worldwide, involving natural uranium ore (U 238), processed uranium (yellow cake), low enriched uranium (<20% U 235) or highly enriched uranium (>20% U 235), radium (Ra 226), polonium (Po 210), and natural thorium ore (Th 232). An important prerequisite to successful illicit trafficking activities is access to a suitable logistical infrastructure enabling an undercover shipment of radioactive materials and, in case of trafficking natural uranium or thorium ore, capable of transporting large volumes of material. Covert en route diversion of an authorised uranium transport, together with covert diversion of uranium concentrate from an operating or closed uranium mines or mills, are subject of case studies. Such cases, involving Israel, Iran, Pakistan and Libya, have been analyzed in terms of international actors involved and methods deployed. Using international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (DSTO) and international experience gained from the fight against drug trafficking, a generic Trafficking Pathway Model (TPM) is developed for trafficking of natural radionuclides. The TPM covers the complete trafficking cycle, ranging from material diversion, covert material transport, material concealment, and all associated operational procedures. The model subdivides the trafficking cycle into five phases: (1) Material diversion by insider(s) or initiation by outsider(s); (2) Covert transport; (3) Material brokerage; (4) Material sale; (5) Material delivery. An Action Plan is recommended, addressing the strengthening of the national infrastructure for material protection and accounting, development of higher standards of good governance, and needs for improving the control system deployed by customs, border guards and security forces.

  9. Assessing alternative strategies for the disposition of weapons-grade uranium and plutonium

    SciTech Connect (OSTI)

    Chow, B.G.

    1995-12-31T23:59:59.000Z

    Highly-enriched uranium (HEU) from dismantled nuclear weapons and military inventory can be blended down into proliferation-resistant low-enriched uranium and used economically as fuel in current nuclear reactors. However, the US can no longer expect the agreement to purchase and resell the uranium blended down from 500 metric tons of Russia`s HEU to be budget neutral. The authors recommend that other countries participate in the repurchase of blended-down uranium from the US and that a multilateral offer to Russia, which acts on behalf of all four former Soviet nuclear republics, be made for the purchase of the blended-down uranium from Russia`s remaining HEU. Since spent fuel in temporary storage worldwide contains enough plutonium to fuel breeders on any realistic buildup schedule in the event that breeders are needed, there is no need to save the weapons-grade plutonium for the future. This paper compares the costs of burning it in existing light water reactors, storing it indefinitely, and burying it after 20 years of storage. They found that the present-valued cost is about $1 to 2 billion in US dollars for all three alternatives. The deciding factor for selection should be an alternative`s proliferation resistance. Prolonged plutonium storage in Russia runs the risk of theft and, if the Russian political scene turns for the worse, the risk of re-use in its nuclear arsenal. The most urgent issue, however, is to determine not the disposition alternative but whether Russia will let its weapons-grade plutonium leave the former Soviet Republics (FSRs). The US should offer to buy and remove such plutonium from the FSRs. If Russia refuses even after the best US efforts, the US should then persuade Russia to burn or bury the plutonium, but not store it indefinitely for future breeder use.

  10. An optimized international vehicle monitor

    SciTech Connect (OSTI)

    York, R.L.; Close, D.A.; Fehlau, P.E.

    1997-03-01T23:59:59.000Z

    The security plans for many DOE facilities require the monitoring of pedestrians and vehicles to control the movement of special nuclear material (SNM). Vehicle monitors often provide the outer-most barrier against the theft of SNM. Automatic monitors determine the presence of SNM by comparing the gamma-ray and neutron intensity while occupied, to the continuously updated background radiation level which is measured while the unit is unoccupied. The most important factors in choosing automatic vehicle monitors are sensitivity, cost and in high traffic applications total monitoring time. The two types of automatic vehicle monitors presently in use are the vehicle monitoring station and the drive-through vehicle monitor. These two types have dramatically different cost and sensitivities. The vehicle monitoring station has a worst-case detection sensitivity of 40 g of highly enriched uranium, HEU, and a cost approximately $180k. This type of monitor is very difficult to install and can only be used in low traffic flow locations. The drive-through vehicle portal has a worst-case detection sensitivity of 1 kg of HEU and a cost approximately $20k. The world`s political situation has created a pressing need to prevent the diversion of SNM from FSU nuclear facilities and across international borders. Drive-through vehicle monitors would be an effective and practical nuclear material proliferation deterrent if their sensitivity can be improved to a sufficient level. The goal of this project is to evaluate different detector configurations as a means of improving the sensitivity of these instruments to achieve a vehicle monitor that is economical, practical to install, and has adequate sensitivity to be an effective barrier to illegal transportation of SNM.

  11. Technical solutions to nonproliferation challenges

    SciTech Connect (OSTI)

    Satkowiak, Lawrence [Director, Nonproliferation, Safeguards and Security Programs, Oak Ridge National Laboratory, Oak Ridge, Tennessee (United States)

    2014-05-09T23:59:59.000Z

    The threat of nuclear terrorism is real and poses a significant challenge to both U.S. and global security. For terrorists, the challenge is not so much the actual design of an improvised nuclear device (IND) but more the acquisition of the special nuclear material (SNM), either highly enriched uranium (HEU) or plutonium, to make the fission weapon. This paper provides two examples of technical solutions that were developed in support of the nonproliferation objective of reducing the opportunity for acquisition of HEU. The first example reviews technologies used to monitor centrifuge enrichment plants to determine if there is any diversion of uranium materials or misuse of facilities to produce undeclared product. The discussion begins with a brief overview of the basics of uranium processing and enrichment. The role of the International Atomic Energy Agency (IAEA), its safeguard objectives and how the technology evolved to meet those objectives will be described. The second example focuses on technologies developed and deployed to monitor the blend down of 500 metric tons of HEU from Russia's dismantled nuclear weapons to reactor fuel or low enriched uranium (LEU) under the U.S.-Russia HEU Purchase Agreement. This reactor fuel was then purchased by U.S. fuel fabricators and provided about half the fuel for the domestic power reactors. The Department of Energy established the HEU Transparency Program to provide confidence that weapons usable HEU was being blended down and thus removed from any potential theft scenario. Two measurement technologies, an enrichment meter and a flow monitor, were combined into an automated blend down monitoring system (BDMS) and were deployed to four sites in Russia to provide 24/7 monitoring of the blend down. Data was downloaded and analyzed periodically by inspectors to provide the assurances required.

  12. GTRI Remote Monitoring System: Training and Operational Needs Assessment Analysis Report

    SciTech Connect (OSTI)

    Day, Debra E.; Fox, Sorcha

    2012-04-20T23:59:59.000Z

    The mission of the United States Department of Energy (DOE) National Nuclear Security Administrations (NNSA's) Global Threat Reduction Initiative (GTRI) is to identify, secure, recover and facilitate the disposition of vulnerable nuclear and high-risk radioactive materials around the world that pose a threat to the United States and the international community. The GTRI's unique mission to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide directly addresses recommendations of the 9/11 Commission1, and is a vital part of the President's National Security Strategy and the Global Initiative. The GTRI Remote Monitoring System (RMS) is a standalone security system that includes radiation and tamper alarms, and CCTV; which can be transmitted securely over the Internet to multiple on-site and off-site locations. Through our experiences during installation of the system at 162 sites, plus feedback received from Alarm Response Training course participants, site input to project teams and analysis of trouble calls; indications were that current system training was lacking and inconsistent. A survey was undertaken to gather information from RMS users across the nation, to evaluate the current level of training and determine what if any improvements needed to be made. Additional questions were focused on the operation of the RMS software. The training survey was initially sent electronically to 245 users at the RMS sites and achieved a 37.6% return rate. Analysis of the resulting data revealed that 34.6% of the respondents had not received training or were unsure if they had, despite the fact that vendor engineers provide training at installation of the system. Any training received was referred to as minimal, and brief, not documented, and nothing in writing. 63.7% of respondents said they were either not at all prepared or only somewhat prepared to use the RMS software required to effectively operate the system. As a result of this analysis, a formal training curriculum will be designed and implemented to include several blended learning delivery options. This training will be piloted at RMS sites; initial training will become a required element of RMS installation and refresher training will be considered for sustainability of operations.

  13. NEUTRON MULTIPLICITY AND ACTIVE WELL NEUTRON COINCIDENCE VERIFICATION MEASUREMENTS PERFORMED FOR MARCH 2009 SEMI-ANNUAL DOE INVENTORY

    SciTech Connect (OSTI)

    Dewberry, R.; Ayers, J.; Tietze, F.; Klapper, K.

    2010-02-05T23:59:59.000Z

    The Analytical Development (AD) Section field nuclear measurement group performed six 'best available technique' verification measurements to satisfy a DOE requirement instituted for the March 2009 semi-annual inventory. The requirement of (1) yielded the need for SRNL Research Operations Department Material Control & Accountability (MC&A) group to measure the Pu content of five items and the highly enrich uranium (HEU) content of two. No 14Q-qualified measurement equipment was available to satisfy the requirement. The AD field nuclear group has routinely performed the required Confirmatory Measurements for the semi-annual inventories for fifteen years using sodium iodide and high purity germanium (HpGe) {gamma}-ray pulse height analysis nondestructive assay (NDA) instruments. With appropriate {gamma}-ray acquisition modeling, the HpGe spectrometers can be used to perform verification-type quantitative assay for Pu-isotopics and HEU content. The AD nuclear NDA group is widely experienced with this type of measurement and reports content for these species in requested process control, MC&A booking, and holdup measurements assays Site-wide. However none of the AD HpGe {gamma}-ray spectrometers have been 14Q-qualified, and the requirement of reference 1 specifically excluded a {gamma}-ray PHA measurement from those it would accept for the required verification measurements. The requirement of reference 1 was a new requirement for which the Savannah River National Laboratory (SRNL) Research Operations Department (ROD) MC&A group was unprepared. The criteria for exemption from verification were: (1) isotope content below 50 grams; (2) intrinsically tamper indicating or TID sealed items which contain a Category IV quantity of material; (3) assembled components; and (4) laboratory samples. Therefore all (SRNL) Material Balance Area (MBA) items with greater than 50 grams total Pu or greater than 50 grams HEU were subject to a verification measurement. The pass/fail criteria of reference 7 stated 'The facility will report measured values, book values, and statistical control limits for the selected items to DOE SR...', and 'The site/facility operator must develop, document, and maintain measurement methods for all nuclear material on inventory'. These new requirements exceeded SRNL's experience with prior semi-annual inventory expectations, but allowed the AD nuclear field measurement group to demonstrate its excellent adaptability and superior flexibility to respond to unpredicted expectations from the DOE customer. The requirements yielded five SRNL items subject to Pu verification and two SRNL items subject to HEU verification. These items are listed and described in Table 1.

  14. ENVIRONMENTAL SAMPLING USING LOCATION SPECIFIC AIR MONITORING IN BULK HANDLING FACILITIES

    SciTech Connect (OSTI)

    Sexton, L.; Hanks, D.; Degange, J.; Brant, H.; Hall, G.; Cable-Dunlap, P.; Anderson, B.

    2011-06-07T23:59:59.000Z

    Since the introduction of safeguards strengthening measures approved by the International Atomic Energy Agency (IAEA) Board of Governors (1992-1997), international nuclear safeguards inspectors have been able to utilize environmental sampling (ES) (e.g. deposited particulates, air, water, vegetation, sediments, soil and biota) in their safeguarding approaches at bulk uranium/plutonium handling facilities. Enhancements of environmental sampling techniques used by the IAEA in drawing conclusions concerning the absence of undeclared nuclear materials or activities will soon be able to take advantage of a recent step change improvement in the gathering and analysis of air samples at these facilities. Location specific air monitoring feasibility tests have been performed with excellent results in determining attribute and isotopic composition of chemical elements present in an actual test-bed sample. Isotopic analysis of collected particles from an Aerosol Contaminant Extractor (ACE) collection, was performed with the standard bulk sampling protocol used throughout the IAEA network of analytical laboratories (NWAL). The results yielded bulk isotopic values expected for the operations. Advanced designs of air monitoring instruments such as the ACE may be used in gas centrifuge enrichment plants (GCEP) to detect the production of highly enriched uranium (HEU) or enrichments not declared by a State. Researchers at Savannah River National Laboratory in collaboration with Oak Ridge National Laboratory are developing the next generation of ES equipment for air grab and constant samples that could become an important addition to the international nuclear safeguards inspector's toolkit. Location specific air monitoring to be used to establish a baseline environmental signature of a particular facility employed for comparison of consistencies in declared operations will be described in this paper. Implementation of air monitoring will be contrasted against the use of smear ES when used during unannounced inspections, design information verification, limited frequency unannounced access, and complementary access visits at bulk handling facilities. Analysis of technical features required for tamper indication and resistance will demonstrate the viability of successful application of the system in taking ES within a bulk handling location. Further exploration of putting this technology into practice is planned to include mapping uranium enrichment facilities for the identification of optimal for installation of air monitoring devices.

  15. Novel Nuclear Powered Photocatalytic Energy Conversion

    SciTech Connect (OSTI)

    White,John R.; Kinsmen,Douglas; Regan,Thomas M.; Bobek,Leo M.

    2005-08-29T23:59:59.000Z

    The University of Massachusetts Lowell Radiation Laboratory (UMLRL) is involved in a comprehensive project to investigate a unique radiation sensing and energy conversion technology with applications for in-situ monitoring of spent nuclear fuel (SNF) during cask transport and storage. The technology makes use of the gamma photons emitted from the SNF as an inherent power source for driving a GPS-class transceiver that has the ability to verify the position and contents of the SNF cask. The power conversion process, which converts the gamma photon energy into electrical power, is based on a variation of the successful dye-sensitized solar cell (DSSC) design developed by Konarka Technologies, Inc. (KTI). In particular, the focus of the current research is to make direct use of the high-energy gamma photons emitted from SNF, coupled with a scintillator material to convert some of the incident gamma photons into photons having wavelengths within the visible region of the electromagnetic spectrum. The high-energy gammas from the SNF will generate some power directly via Compton scattering and the photoelectric effect, and the generated visible photons output from the scintillator material can also be converted to electrical power in a manner similar to that of a standard solar cell. Upon successful implementation of an energy conversion device based on this new gammavoltaic principle, this inherent power source could then be utilized within SNF storage casks to drive a tamper-proof, low-power, electronic detection/security monitoring system for the spent fuel. The current project has addressed several aspects associated with this new energy conversion concept, including the development of a base conceptual design for an inherent gamma-induced power conversion unit for SNF monitoring, the characterization of the radiation environment that can be expected within a typical SNF storage system, the initial evaluation of Konarka's base solar cell design, the design and fabrication of a range of new cell materials and geometries at Konarka's manufacturing facilities, and the irradiation testing and evaluation of these new cell designs within the UML Radiation Laboratory. The primary focus of all this work was to establish the proof of concept of the basic gammavoltaic principle using a new class of dye-sensitized photon converter (DSPC) materials based on KTI's original DSSC design. In achieving this goal, this report clearly establishes the viability of the basic gammavoltaic energy conversion concept, yet it also identifies a set of challenges that must be met for practical implementation of this new technology.

  16. Termination of Safeguards on ULWBR Material

    SciTech Connect (OSTI)

    Ivan R. Thomas; Ernest L. Laible

    2008-07-01T23:59:59.000Z

    The Department of Energy (DOE), Office of Environmental Management, has approved the disposition of 31 metric tons of Unirradiated Light Water Breeder Reactor (ULWBR) material in canisters stored within dry wells of the Underground Fuel Storage Facility at the Idaho Nuclear Technology and Engineering Center (INTEC). This unirradiated material consists primarily of ceramic pellets of thorium oxide in stainless steel cladding, but it also contains 300 kilograms of uranium that is 98 wt% U-233. The ULWBR material was not processed at the INTEC because it was incompatible with prior chemical separation schemes. Other economical recovery options have not been identified, and expressions of interest for consolidating the material with existing projects at other DOE sites have not been received. The U-233 could be used for producing the medical isotope Actinium-225, but the proof-of-principle demonstration and follow-on pilot program have not been developed to the point of requiring production quantities of U-233. Consequently, the selected disposition of the ULWBR material was burial as Low Level Waste at the Nevada Test Site (NTS), which required terminating safeguards controls for the contained Category II quantity of Attractiveness Level D special nuclear material (SNM). The requested termination followed the twelve point evaluation criteria of the Historical Defense Program Discard Guidance and included a security analysis for evaluating the risks of theft, diversion, and radiological sabotage associated with the material. Continuity of knowledge in the book inventory was assured by documenting that the original shipper’s measurements accurately reflected the quantities of materials received and that the ULWBR materials had remained under adequate physical protection and had been subject to periodic physical inventories. The method selected for substantiating the book values as the basis for terminating safeguards was the nondestructive assay used during physical inventories. Shipping arrangements included refurbishing a licensed cask to be reused over the duration of the termination process. An accompanying batching plan and shipping schedule were developed to accommodate multiple commercial shipments of Category III quantities of SNM in the selected cask, such that all canisters would be received at NTS prior to the expiration of the nonrenewable cask license.

  17. Facility Safeguardability Analysis In Support of Safeguards-by-Design

    SciTech Connect (OSTI)

    Philip Casey Durst; Roald Wigeland; Robert Bari; Trond Bjornard; John Hockert; Michael Zentner

    2010-07-01T23:59:59.000Z

    The following report proposes the use of Facility Safeguardability Analysis (FSA) to: i) compare and evaluate nuclear safeguards measures, ii) optimize the prospective facility safeguards approach, iii) objectively and analytically evaluate nuclear facility safeguardability, and iv) evaluate and optimize barriers within the facility and process design to minimize the risk of diversion and theft of nuclear material. As proposed by the authors, Facility Safeguardability Analysis would be used by the Facility Designer and/or Project Design Team during the design and construction of the nuclear facility to evaluate and optimize the facility safeguards approach and design of the safeguards system. Through a process of “Safeguards-by-Design” (SBD), this would be done at the earliest stages of project conceptual design and would involve domestic and international nuclear regulators and authorities, including the International Atomic Energy Agency (IAEA). The benefits of the Safeguards-by-Design approach is that it would clarify at a very early stage the international and domestic safeguards requirements for the Construction Project Team, and the best design and operating practices for meeting these requirements. It would also minimize the risk to the construction project, in terms of cost overruns or delays, which might otherwise occur if the nuclear safeguards measures are not incorporated into the facility design at an early stage. Incorporating nuclear safeguards measures is straight forward for nuclear facilities of existing design, but becomes more challenging with new designs and more complex nuclear facilities. For this reason, the facility designer and Project Design Team require an analytical tool for comparing safeguards measures, options, and approaches, and for evaluating the “safeguardability” of the facility. The report explains how preliminary diversion path analysis and the Proliferation Resistance and Physical Protection (PRPP) evaluation methodology can be adapted for evaluating and assessing the safeguardability of nuclear facilities – both existing, as well as those still on the drawing board. The advantages of the Facility Safeguardability Analysis is that it would not only give the facility designer an analytical method for evaluating and assessing the safeguards measures and approaches for the prospective facility, but also the ability to optimize the design of the facility process for enhancing facility safeguardability. The following report explains the need for Facility Safeguardability Analysis and explains how it could be used in the Safeguards-by-Design, in support of the design and construction of nuclear facilities.

  18. Inspection Report "Personal Property Management at Lawrence Livermore National Laboratory"

    SciTech Connect (OSTI)

    None

    2009-05-01T23:59:59.000Z

    The Department of Energy's (DOE's) Lawrence Livermore National Laboratory (Livermore) is a premier research and development institution for science and technology supporting the core mission of national security. According to Livermore, as of November 2008 the Laboratory managed 64,933 items of Government personal property valued at about $1 billion. At the beginning of Fiscal Year 2008, Livermore reported 249 DOE property items valued at about $1.3 million that were missing, unaccounted for, or stolen during Fiscal Year 2007. Livermore centrally tracks property utilizing the Sunflower Assets system (Sunflower), which reflects the cradle to grave history of each property item. Changes in the custodianship and/or location of a property item must be timely reported by the custodian to the respective property center representative for updating in Sunflower. In Fiscal Year 2008, over 2,000 individuals were terminated as a result of workforce reduction at Livermore, of which about 750 received a final notification of termination on the same day that they were required to depart the facility. All of these terminations potentially necessitated updates to the property database, but the involuntary terminations had the potential to pose particular challenges because of the immediacy of individuals departures. The objective of our inspection was to evaluate the adequacy of Livermore's internal controls over Government property. Based upon the results of our preliminary field work, we particularly focused on personal property assigned to terminated individuals and stolen laptop computers. We concluded that Livermore's internal controls over property could be improved, which could help to reduce the number of missing, unaccounted for, or stolen property items. Specifically, we found that: (1) The location and/or custodian of approximately 18 percent of the property items in our sample, which was drawn from the property assigned to individuals terminated on short notice in 2008, was inaccurately reflected in Sunflower. The data in this system is relied upon for tracking purposes, so inaccurate entries could increase the probability of property not being located during inventories and, thus, being reported as 'lost' or 'missing'. We believe that providing formal training to property custodians, which was not being done at the time of our inspection, could help improve this situation. (2) Some property custodians were not adequately protecting their Government laptop computers when taking them offsite, and they were not held accountable for the subsequent theft of the laptops. We made several recommendations to management intended to improve property controls at Livermore.

  19. Clean Cities Guide to Alternative Fuel Commercial Lawn Equipment (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2011-10-01T23:59:59.000Z

    Guide explains the different types of alternative fuel commercial mowers and lists the makes and models of the ones available on the market. Turf grass is a fixture of the American landscape and the American economy. It is the nation's largest irrigated crop, covering more than 40 million acres. Legions of lawnmowers care for this expanse during the growing season-up to year-round in the warmest climates. The annual economic impact of the U.S. turf grass industry has been estimated at more than $62 billion. Lawn mowing also contributes to the nation's petroleum consumption and pollutant emissions. Mowers consume 1.2 billion gallons of gasoline annually, about 1% of U.S. motor gasoline consumption. Commercial mowing accounts for about 35% of this total and is the highest-intensity use. Large property owners and mowing companies cut lawns, sports fields, golf courses, parks, roadsides, and other grassy areas for 7 hours per day and consume 900 to 2,000 gallons of fuel annually depending on climate and length of the growing season. In addition to gasoline, commercial mowing consumes more than 100 million gallons of diesel annually. Alternative fuel mowers are one way to reduce the energy and environmental impacts of commercial lawn mowing. They can reduce petroleum use and emissions compared with gasoline- and diesel-fueled mowers. They may also save on fuel and maintenance costs, extend mower life, reduce fuel spillage and fuel theft, and promote a 'green' image. And on ozone alert days, alternative fuel mowers may not be subject to the operational restrictions that gasoline mowers must abide by. To help inform the commercial mowing industry about product options and potential benefits, Clean Cities produced this guide to alternative fuel commercial lawn equipment. Although the guide's focus is on original equipment manufacturer (OEM) mowers, some mowers can be converted to run on alternative fuels. For more information about propane conversions. This guide may be particularly helpful for organizations that are already using alternative fuels in their vehicles and have an alternative fuel supply or electric charging in place (e.g., golf cart charging stations at most golf courses). On the flip side, experiencing the benefits of using alternative fuels in mowing equipment may encourage organizations to try them in on-road vehicles as well. Whatever the case, alternative fuel commercial lawnmowers are a powerful and cost-effective way to reduce U.S. petroleum dependence and help protect the environment.

  20. Nuclear Material Control and Accountability System Effectiveness Tool (MSET)

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL; Campbell, Billy J [ORNL] [ORNL; Hammond, Glenn A [ORNL] [ORNL; Meppen, Bruce W [ORNL] [ORNL; Brown, Richard F [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    A nuclear material control and accountability (MC&A) system effectiveness tool (MSET) has been developed in the United States for use in evaluating material protection, control, and accountability (MPC&A) systems in nuclear facilities. The project was commissioned by the National Nuclear Security Administration's Office of International Material Protection and Cooperation. MSET was developed by personnel with experience spanning more than six decades in both the U.S. and international nuclear programs and with experience in probabilistic risk assessment (PRA) in the nuclear power industry. MSET offers significant potential benefits for improving nuclear safeguards and security in any nation with a nuclear program. MSET provides a design basis for developing an MC&A system at a nuclear facility that functions to protect against insider theft or diversion of nuclear materials. MSET analyzes the system and identifies several risk importance factors that show where sustainability is essential for optimal performance and where performance degradation has the greatest impact on total system risk. MSET contains five major components: (1) A functional model that shows how to design, build, implement, and operate a robust nuclear MC&A system (2) A fault tree of the operating MC&A system that adapts PRA methodology to analyze system effectiveness and give a relative risk of failure assessment of the system (3) A questionnaire used to document the facility's current MPC&A system (provides data to evaluate the quality of the system and the level of performance of each basic task performed throughout the material balance area [MBA]) (4) A formal process of applying expert judgment to convert the facility questionnaire data into numeric values representing the performance level of each basic event for use in the fault tree risk assessment calculations (5) PRA software that performs the fault tree risk assessment calculations and produces risk importance factor reports on the facility's MC&A (software widely used in the aerospace, chemical, and nuclear power industries) MSET was peer reviewed in 2007 and validated in 2008 by benchmark testing at the Idaho National Laboratory in the United States. The MSET documents were translated into Russian and provided to Rosatom in July of 2008, and MSET is currently being evaluated for potential application in Russian Nuclear Facilities.

  1. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  2. Material Control and Accounting Design Considerations for High-Temperature Gas Reactors

    SciTech Connect (OSTI)

    Trond Bjornard; John Hockert

    2011-08-01T23:59:59.000Z

    The subject of this report is domestic safeguards and security by design (2SBD) for high-temperature gas reactors, focusing on material control and accountability (MC&A). The motivation for the report is to provide 2SBD support to the Next Generation Nuclear Plant (NGNP) project, which was launched by Congress in 2005. This introductory section will provide some background on the NGNP project and an overview of the 2SBD concept. The remaining chapters focus specifically on design aspects of the candidate high-temperature gas reactors (HTGRs) relevant to MC&A, Nuclear Regulatory Commission (NRC) requirements, and proposed MC&A approaches for the two major HTGR reactor types: pebble bed and prismatic. Of the prismatic type, two candidates are under consideration: (1) GA's GT-MHR (Gas Turbine-Modular Helium Reactor), and (2) the Modular High-Temperature Reactor (M-HTR), a derivative of Areva's Antares reactor. The future of the pebble-bed modular reactor (PBMR) for NGNP is uncertain, as the PBMR consortium partners (Westinghouse, PBMR [Pty] and The Shaw Group) were unable to agree on the path forward for NGNP during 2010. However, during the technology assessment of the conceptual design phase (Phase 1) of the NGNP project, AREVA provided design information and technology assessment of their pebble bed fueled plant design called the HTR-Module concept. AREVA does not intend to pursue this design for NGNP, preferring instead a modular reactor based on the prismatic Antares concept. Since MC&A relevant design information is available for both pebble concepts, the pebble-bed HTGRs considered in this report are: (1) Westinghouse PBMR; and (2) AREVA HTR-Module. The DOE Office of Nuclear Energy (DOE-NE) sponsors the Fuel Cycle Research and Development program (FCR&D), which contains an element specifically focused on the domestic (or state) aspects of SBD. This Material Protection, Control and Accountancy Technology (MPACT) program supports the present work summarized in this report, namely the development of guidance to support the consideration of MC&A in the design of both pebble-bed and prismatic-fueled HTGRs. The objective is to identify and incorporate design features into the facility design that will cost effectively aid in making MC&A more effective and efficient, with minimum impact on operations. The theft of nuclear material is addressed through both MC&A and physical protection, while the threat of sabotage is addressed principally through physical protection.

  3. The effect of terrorism on public confidence : an exploratory study.

    SciTech Connect (OSTI)

    Berry, M. S.; Baldwin, T. E.; Samsa, M. E.; Ramaprasad, A.; Decision and Information Sciences

    2008-10-31T23:59:59.000Z

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the metrics it uses to assess the consequences of terrorist attacks. Hence, several factors--including a detailed understanding of the variations in public confidence among individuals, by type of terrorist event, and as a function of time--are critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data were collected from the groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery bombing, and cyber intrusions on financial institutions that resulted in identity theft and financial losses. Our findings include the following: (a) the subjects can be classified into at least three distinct groups on the basis of their baseline outlook--optimistic, pessimistic, and unaffected; (b) the subjects make discriminations in their interpretations of an event on the basis of the nature of a terrorist attack, the time horizon, and its impact; (c) the recovery of confidence after a terrorist event has an incubation period and typically does not return to its initial level in the long-term; (d) the patterns of recovery of confidence differ between the optimists and the pessimists; and (e) individuals are able to associate a monetary value with a loss or gain in confidence, and the value associated with a loss is greater than the value associated with a gain. These findings illustrate the importance the public places in their confidence in government and law enforcement and also indicate that the level of importance is clearly of a magnitude on the order of other major terrorist event consequences, such as loss of human life and impacts to the economy.

  4. Disassembly and Sanitization of Classified Matter

    SciTech Connect (OSTI)

    Stockham, Dwight J.; Saad, Max P. [Sandia National Laboratories, P.O. Box 5800-1151, Albuquerque, NM, 87185 (United States)

    2008-01-15T23:59:59.000Z

    The Disassembly Sanitization Operation (DSO) process was implemented to support weapon disassembly and disposition by using recycling and waste minimization measures. This process was initiated by treaty agreements and reconfigurations within both the DOD and DOE Complexes. The DOE is faced with disassembling and disposing of a huge inventory of retired weapons, components, training equipment, spare parts, weapon maintenance equipment, and associated material. In addition, regulations have caused a dramatic increase in the need for information required to support the handling and disposition of these parts and materials. In the past, huge inventories of classified weapon components were required to have long-term storage at Sandia and at many other locations throughout the DoE Complex. These materials are placed in onsite storage unit due to classification issues and they may also contain radiological and/or hazardous components. Since no disposal options exist for this material, the only choice was long-term storage. Long-term storage is costly and somewhat problematic, requiring a secured storage area, monitoring, auditing, and presenting the potential for loss or theft of the material. Overall recycling rates for materials sent through the DSO process have enabled 70 to 80% of these components to be recycled. These components are made of high quality materials and once this material has been sanitized, the demand for the component metals for recycling efforts is very high. The DSO process for NGPF, classified components established the credibility of this technique for addressing the long-term storage requirements of the classified weapons component inventory. The success of this application has generated interest from other Sandia organizations and other locations throughout the complex. Other organizations are requesting the help of the DSO team and the DSO is responding to these requests by expanding its scope to include Work-for- Other projects. For example, Pantex personnel have asked the DSO team to assist them with the destruction of their stored classified components. The DSO process is in full-scale operation and continues to grow and serve SNL/NM and DOE by providing a solution to this evolving disposal issue. For some time, SNL has incurred significant expenses for the management and storage of classified components. This project is estimated to save DOE and Sandia several hundreds of thousands of dollars while the excess inventory is eliminated. This innovative approach eliminates the need for long-term storage of classified weapons components and the associated monitoring and accounting expenditures.

  5. Plutonium immobilization form evaluation

    SciTech Connect (OSTI)

    Gray, L. W., LLNL

    1998-02-13T23:59:59.000Z

    The 1994 National Academy of Sciences study and the 1997 assessment by DOE`s Office of Nonproliferation and National Security have emphasized the importance of the overall objectives of the Plutonium Disposition Program of beginning disposition rapidly. President Clinton and other leaders of the G-7 plus one (`Political Eight`) group of states, at the Moscow Nuclear Safety And Security Summit in April 1996, agreed on the objectives of accomplishing disposition of excess fissile material as soon as practicable. To meet these objectives, DOE has laid out an aggressive schedule in which large-scale immobilization operations would begin in 2005. Lawrence Livermore National Laboratory (LLNL), the lead laboratory for the development of Pu immobilization technologies for the Department of Energy`s Office of Fissile Materials Disposition (MD), was requested by MD to recommend the preferred immobilization form and technology for the disposition of excess weapons-usable Pu. In a series of three separate evaluations, the technologies for the candidate glass and ceramic forms were compared against criteria and metrics that reflect programmatic and technical objectives: (1) Evaluation of the R&D and engineering data for the two forms against the decision criteria/metrics by a technical evaluation panel comprising experts from within the immobilization program. (2) Integrated assessment by LLNL immobilization management of the candidate technologies with respect to the weighted criteria and other programmatic objectives, leading to a recommendation to DOE/MD on the preferred technology based on technical factors. (3) Assessment of the decision process, evaluation, and recommendation by a peer review panel of independent experts. Criteria used to assess the relative merits of the immobilization technologies were a subset of the criteria previously used by MD to choose among disposition options leading to the Programmatic Environmental Impact Statement and Record of Decision for the Storage and Disposition of Weapons-Usable Fissile Materials, January 1997. Criteria were: (1) resistance to Pu theft, diversion, and recovery by a terrorist organization or rogue nation; (2) resistance to recovery and reuse by host nation; (3) technical viability, including technical maturity, development risk, and acceptability for repository disposal; (4) environmental, safety, and health factors; (5) cost effectiveness; and (6) timeliness. On the basis of the technical evaluation and assessments, in September, 1997, LLNL recommended to DOE/MD that ceramic technologies be developed for deployment in the planned Pu immobilization plant.

  6. Summary

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    An effective risk assessment system is needed to address the threat posed by an active or passive insider who, acting alone or in collusion, could attempt diversion or theft of nuclear material. The material control and accountability (MC&A) system effectiveness tool (MSET) is a self-assessment or inspection tool utilizing probabilistic risk assessment (PRA) methodology to calculate the system effectiveness of a nuclear facility's material protection, control, and accountability (MPC&A) system. The MSET process is divided into four distinct and separate parts: (1) Completion of the questionnaire that assembles information about the operations of every aspect of the MPC&A system; (2) Conversion of questionnaire data into numeric values associated with risk; (3) Analysis of the numeric data utilizing the MPC&A fault tree and the SAPHIRE computer software; and (4) Self-assessment using the MSET reports to perform the effectiveness evaluation of the facility's MPC&A system. The process should lead to confirmation that mitigating features of the system effectively minimize the threat, or it could lead to the conclusion that system improvements or upgrades are necessary to achieve acceptable protection against the threat. If the need for system improvements or upgrades is indicated when the system is analyzed, MSET provides the capability to evaluate potential or actual system improvements or upgrades. A facility's MC&A system can be evaluated at a point in time. The system can be reevaluated after upgrades are implemented or after other system changes occur. The total system or specific subareas within the system can be evaluated. Areas of potential system improvement can be assessed to determine where the most beneficial and cost-effective improvements should be made. Analyses of risk importance factors show that sustainability is essential for optimal performance and reveals where performance degradation has the greatest impact on total system risk. The risk importance factors show the amount of risk reduction achievable with potential upgrades and the amount of risk reduction achieved after upgrades are completed. Applying the risk assessment tool gives support to budget prioritization by showing where budget support levels must be sustained for MC&A functions most important to risk. Results of the risk assessment are also useful in supporting funding justifications for system improvements that significantly reduce system risk. The functional model, the system risk assessment tool, and the facility evaluation questionnaire are valuable educational tools for MPC&A personnel. These educational tools provide a framework for ongoing dialogue between organizations regarding the design, development, implementation, operation, assessment, and sustainability of MPC&A systems. An organization considering the use of MSET as an analytical tool for evaluating the effectiveness of its MPC&A system will benefit from conducting a complete MSET exercise at an existing nuclear facility.

  7. Development and Demonstration of a Security Core Component

    SciTech Connect (OSTI)

    Turke, Andy

    2014-02-28T23:59:59.000Z

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more data about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.

  8. Successful Waste Treatment Methods at Sandia National Laboratories

    SciTech Connect (OSTI)

    Rast, D.M.; Thompson, J.J.; Cooper, T.W.; Stockham, D.J

    2007-07-01T23:59:59.000Z

    During the remediation of the waste landfills at Sandia National Laboratory in Albuquerque, New Mexico nine drums of mock high explosives were generated. This mixed waste stream was proposed to several offsite vendors for treatment and prices ranged from $2.50 to $10 per gram a total cost estimated to be in excess of $2 million dollars. This cost represents more than 30 percent of the annual budget for the Sandia Waste Management Operations. Concentrated solutions of common oxidizers, such as nitrates, nitrites, and peroxides, will also act as oxidizers and will give positive results in the Hazard Categorization oxidizer test. These solutions carry an EPA Hazardous Waste Number D001, Ignitable Waste, and Oxidizer as defined in 49 CFR 173.151. Sandia decided that given budget and time constraints to meet a Federal Facilities Compliance Act milestone, a process for onsite treatment should be evaluated. Clean samples of mock high explosive materials were obtained from Pantex excess inventory and treatability studies initiated to develop a treatment formula and process. The following process was developed and implemented in the summer of 2006: - Size reduction to allow for dissolution of the barium nitrate in water; - Dissolution of the Mock HE in water; - Deactivation of the oxidizer; - Stabilization of the barium and the cadmium contamination present as an underlying hazardous constituent. This project was completed and the treatment milestone achieved for less than $300,000. The Disassembly Sanitization Operation (DSO) is a process that was implemented to support weapon disassembly and disposition using recycling and waste minimization while achieving the demilitarization mission. The Department of Energy is faced with disassembling and disposition of a huge inventory of retired weapons, components, training equipment, spare parts, and weapon maintenance equipment. Environmental regulations have caused a dramatic increase for information needed to support the disposal and handling of these parts and materials. Manufacturing information from past decades often does not meet the needs for regulatory decisions of today to assure proper management of weapons components. Huge inventories of classified weapon components were required to have long-term storage at Sandia and many other locations throughout the complex. These materials are stored because they are classified, they may also contain radiological and/or hazardous components and disposal options may not have existed for this material. Long-term storage is costly and somewhat problematic. It requires a secured storage area, monitoring, auditing and it also has the potential for loss or theft of this material. Overall recycling rates for materials sent through the DSO process have enabled 70 to 80% of these components to be recycled. These components are made to extreme standards and are made of high quality materials. Once the material has been sanitized, the demand for these metals is very high. The DSO process for the NGPF classified components established the credibility of this technique as a viable process for addressing the long-term storage requirements of classified weapons component inventory. The success of this operation has generated interest from other Sandia Organization other locations throughout the complex. Other organizations are soliciting the help of the DSO team and the DSO is responding to these solicitations by expanding its scope to include work for other projects. For example, Pantex has asked the DSO team to assist with the destruction of their classified components. The operation is full scale and continues to grow and serve SNL/NM and DoE by providing a solution to this evolving issue. On an ongoing basis, SNL has been incurring expenses for the management and storage of classified components. It is estimated that this project will save the DoE and Sandia several hundreds of thousands of dollars until the excess inventory is eliminated. This innovative approach eliminates the need for long-term storage of classified weapons components and the

  9. U.S. and Russian Collaboration in the Area of Nuclear Forensics

    SciTech Connect (OSTI)

    Kristo, M J

    2007-10-22T23:59:59.000Z

    Nuclear forensics has become increasingly important in the fight against illicit trafficking in nuclear and other radioactive materials. The illicit trafficking of nuclear materials is, of course, an international problem; nuclear materials may be mined and milled in one country, manufactured in a second country, diverted at a third location, and detected at a fourth. There have been a number of articles in public policy journals in the past year that call for greater interaction between the U. S. and the rest of the world on the topic of nuclear forensics. Some believe that such international cooperation would help provide a more certain capability to identify the source of the nuclear material used in a terrorist event. An improved international nuclear forensics capability would also be important as part of the IAEA verification toolkit, particularly linked to increased access provided by the additional protocol. A recent study has found that, although international progress has been made in securing weapons-usable HEU and Pu, the effort is still insufficient. They found that nuclear material, located in 40 countries, could be obtained by terrorists and criminals and used for a crude nuclear weapon. Through 2006, the IAEA Illicit Trafficking Database had recorded a total of 607 confirmed events involving illegal possession, theft, or loss of nuclear and other radioactive materials. Although it is difficult to predict the future course of such illicit trafficking, increasingly such activities are viewed as significant threats that merit the development of special capabilities. As early as April, 1996, nuclear forensics was recognized at the G-8 Summit in Moscow as an important element of an illicit nuclear trafficking program. Given international events over the past several years, the value and need for nuclear forensics seems greater than ever. Determining how and where legitimate control of nuclear material was lost and tracing the route of the material from diversion through interdiction are important goals for nuclear forensics and attribution. It is equally important to determine whether additional devices or materials that pose a threat to public safety are also available. Finding the answer to these questions depends on determining the source of the material and its method of production. Nuclear forensics analysis and interpretation provide essential insights into methods of production and sources of illicit radioactive materials. However, they are most powerful when combined with other sources of information, including intelligence and traditional detective work. The certainty of detection and punishment for those who remove nuclear materials from legitimate control provides the ultimate deterrent for such diversion and, ultimately, for the intended goal of such diversion, including nuclear terrorism or proliferation. Consequently, nuclear forensics is an integral part of 'nuclear deterrence' in the 21st century. Nuclear forensics will always be limited by the diagnostic information inherent in the interdicted material. Important markers for traditional forensics (fingerprints, stray material, etc.) can be eliminated or obscured, but many nuclear materials have inherent isotopic or chemical characteristics that serve as unequivocal markers of specific sources, production processes, or transit routes. The information needed for nuclear forensics goes beyond that collected for most commercial and international verification activities. Fortunately, the international nuclear engineering enterprise has a restricted number of conspicuous process steps that makes the interpretation process easier. Ultimately, though, it will always be difficult to distinguish between materials that reflect similar source or production histories, but are derived from disparate sites. Due to the significant capital costs of the equipment and the specialized expertise of the personnel, work in the field of nuclear forensics has been restricted so far to a handful of national and international laboratories. There are a limited number of

  10. Data Analysis

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Analysis of the material protection, control, and accountability (MPC&A) system is necessary to understand the limits and vulnerabilities of the system to internal threats. A self-appraisal helps the facility be prepared to respond to internal threats and reduce the risk of theft or diversion of nuclear material. The material control and accountability (MC&A) system effectiveness tool (MSET) fault tree was developed to depict the failure of the MPC&A system as a result of poor practices and random failures in the MC&A system. It can also be employed as a basis for assessing deliberate threats against a facility. MSET uses fault tree analysis, which is a top-down approach to examining system failure. The analysis starts with identifying a potential undesirable event called a 'top event' and then determining the ways it can occur (e.g., 'Fail To Maintain Nuclear Materials Under The Purview Of The MC&A System'). The analysis proceeds by determining how the top event can be caused by individual or combined lower level faults or failures. These faults, which are the causes of the top event, are 'connected' through logic gates. The MSET model uses AND-gates and OR-gates and propagates the effect of event failure using Boolean algebra. To enable the fault tree analysis calculations, the basic events in the fault tree are populated with probability risk values derived by conversion of questionnaire data to numeric values. The basic events are treated as independent variables. This assumption affects the Boolean algebraic calculations used to calculate results. All the necessary calculations are built into the fault tree codes, but it is often useful to estimate the probabilities manually as a check on code functioning. The probability of failure of a given basic event is the probability that the basic event primary question fails to meet the performance metric for that question. The failure probability is related to how well the facility performs the task identified in that basic event over time (not just one performance or exercise). Fault tree calculations provide a failure probability for the top event in the fault tree. The basic fault tree calculations establish a baseline relative risk value for the system. This probability depicts relative risk, not absolute risk. Subsequent calculations are made to evaluate the change in relative risk that would occur if system performance is improved or degraded. During the development effort of MSET, the fault tree analysis program used was SAPHIRE. SAPHIRE is an acronym for 'Systems Analysis Programs for Hands-on Integrated Reliability Evaluations.' Version 1 of the SAPHIRE code was sponsored by the Nuclear Regulatory Commission in 1987 as an innovative way to draw, edit, and analyze graphical fault trees primarily for safe operation of nuclear power reactors. When the fault tree calculations are performed, the fault tree analysis program will produce several reports that can be used to analyze the MPC&A system. SAPHIRE produces reports showing risk importance factors for all basic events in the operational MC&A system. The risk importance information is used to examine the potential impacts when performance of certain basic events increases or decreases. The initial results produced by the SAPHIRE program are considered relative risk values. None of the results can be interpreted as absolute risk values since the basic event probability values represent estimates of risk associated with the performance of MPC&A tasks throughout the material balance area (MBA). The RRR for a basic event represents the decrease in total system risk that would result from improvement of that one event to a perfect performance level. Improvement of the basic event with the greatest RRR value produces a greater decrease in total system risk than improvement of any other basic event. Basic events with the greatest potential for system risk reduction are assigned performance improvement values, and new fault tree calculations show the improvement in total system risk. The ope