National Library of Energy BETA

Sample records for vulnerability assessment programs

  1. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  2. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  3. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  4. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future ...

  5. Hawaii Energy Strategy: Program guide. [Contains special sections on analytical energy forecasting, renewable energy resource assessment, demand-side energy management, energy vulnerability assessment, and energy strategy integration

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii's energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii's energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  6. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... SCADA Images Since 1999, Sandia has conducted numerous assessments of SCADA and process control systems in hydroelectric dams; water treatment systems; electric power transmission, ...

  7. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  8. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  9. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  10. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  11. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  12. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  13. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  14. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  15. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  16. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Energy Savers [EERE]

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  17. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  18. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  19. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  20. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  1. Assessment Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... SCADA Assessments Since 1999, Sandia has conducted numerous assessments of operational systems in hydroelectric dams; water treatment systems; electric power transmission, ...

  2. Assessment Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs Advanced Nuclear Energy

  3. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  4. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  5. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  6. ORISE: Radiological program assessment services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiological program assessment services Minimizing the risk of human exposure to hazardous levels of radioactive materials requires designing a comprehensive safety program that...

  7. CRAD, Self-Assessment Program Assessment Plan | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Self-Assessment Program Assessment Plan CRAD, Self-Assessment Program Assessment Plan ... assessment supports management's goal to protect people and the environment from harm. ...

  8. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  9. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    SciTech Connect (OSTI)

    Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge-failure resilient network design problem (DRNDP). This problem entails the design of a directed multi-commodity flow network that is capable of fulfilling a specified percentage of demands in the event that any G arcs are destroyed, where G is a constant parameter. We present a formulation of DRNDP and solve it in a branch-column-cut framework. We present computational results.

  10. Assessment B - Program Criteria | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    B - Program Criteria Assessment B - Program Criteria PDF icon Microsoft Word - Assessment-B-ProgramCriteria More Documents & Publications ATTACHMENT A - CHECKLIST FOR SELF ASSESSMENT Assessment C-Site Visit Protocol EERE Program Management Guide - Chapter 2

  11. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Energy Savers [EERE]

    Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

  12. Common Cyber Security Vulnerabilities Observed in Control System

    Energy Savers [EERE]

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  13. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  14. ORISE: Radiological program assessment services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Radiological program assessment services Minimizing the risk of human exposure to hazardous levels of radioactive materials requires designing a comprehensive safety program that ensures appropriate measures are taken to protect workers and the public. As a U.S. Department of Energy (DOE) institute, the Oak Ridge Institute for Science and Education (ORISE) understands the importance of having an effective safety program in place to assure stakeholders and regulators that your radiological

  15. Beryllium Program Performance Assessments - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Performance Assessments About Us Beryllium Program Beryllium Program Points of Contact Beryllium Facilities & Areas Beryllium Program Information Hanford CBDPP Committee Beryllium FAQs Beryllium Related Links Hanford Beryllium Awareness Group (BAG) Program Performance Assessments Beryllium Program Feedback Beryllium Health Advocates Primary Contractors/Employers Medical Testing and Surveillance Facilities General Resources Beryllium Program Performance Assessments Email Email Page |

  16. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  17. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  18. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  19. Laboratory Accreditation Program Conducted Assessment of WIPP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2014 Laboratory Accreditation Program Conducted Assessment of WIPP The U.S. Department of Energy Laboratory Accreditation Program (DOELAP) recently conducted an assessment of the WIPP external dosimetry program. The external dosimetry program is responsible for measuring and tracking external dose received from ionizing radiation. The purpose of the assessment was to assure routine practices comply with required criteria set forth by DOELAP. The three main kinds of ionizing radiation are

  20. City of Aspen- Energy Assessment Rebate Program

    Broader source: Energy.gov [DOE]

    The City of Aspen encourages interested residents and businesses to increase the energy efficiency of homes and offices through the Energy Assessment Program. Participating homes and offices must...

  1. Technical Qualification Program Self-Assessment Report - Nevada...

    Energy Savers [EERE]

    Qualification Program Self-Assessment Report - Nevada Field Office - 2014 Technical Qualification Program Self-Assessment Report - Nevada Field Office - 2014 This self-assessment...

  2. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  3. Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.

    SciTech Connect (OSTI)

    Enos, David George; Goods, Steven Howard

    2006-11-01

    Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

  4. Microsoft Word - Assessment-B-ProgramCriteria

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ATTACHMENT B PROGRAM ASSESSMENT CRITERIA Identify the following for all sites: Program Management * Number FTE's devoted to Records Management o Full-time Federal and Contractor o Part-time Federal and Contractor Percent of time spent on Records Management duties * Percentage of time each Records Management employee is assigned to: o Program Management o Operations Training/Assistance Schedule Application Records Holding/Storage Area Activities EEOICPA Claims * Monthly Claim Volume Other,

  5. Ivory Coast-UNEP Risoe Technology Needs Assessment Program |...

    Open Energy Info (EERE)

    Ivory Coast-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Ivory Coast-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization...

  6. Peru-UNEP Risoe Technology Needs Assessment Program | Open Energy...

    Open Energy Info (EERE)

    Risoe Technology Needs Assessment Program Jump to: navigation, search Name Peru-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe Centre Sector...

  7. Cambodia-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    Cambodia-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Logo: Cambodia-UNEP Risoe-Technology Needs Assessment Program Name Cambodia-UNEP...

  8. Thailand-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Thailand-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe...

  9. Morocco-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    Risoe Technology Needs Assessment Program Jump to: navigation, search Name Morocco-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe Centre...

  10. Bangladesh-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    Bangladesh-UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Bangladesh-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization...

  11. Georgia-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Georgia-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe...

  12. Technical Qualification Program Self-Assessment Report - Los...

    Energy Savers [EERE]

    4 Technical Qualification Program Self-Assessment Report - Los Alamos Field Office - FY14 The FY14 self-assessment of the Technical Qualifications Program and Federal Technical...

  13. Kenya-UNEP Risoe Technology Needs Assessment Program | Open Energy...

    Open Energy Info (EERE)

    Risoe Technology Needs Assessment Program Jump to: navigation, search Name Kenya-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe Centre...

  14. Costa Rica-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Costa Rica-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe...

  15. Mali-UNEP Risoe Technology Needs Assessment Program | Open Energy...

    Open Energy Info (EERE)

    Risoe Technology Needs Assessment Program Jump to: navigation, search Name Mali-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe Centre Sector...

  16. Vietnam-UNEP Risoe-Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    UNEP Risoe-Technology Needs Assessment Program Jump to: navigation, search Name Vietnam-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe...

  17. Guatemala-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Guatemala-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe...

  18. Senegal-UNEP Risoe-Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    Risoe-Technology Needs Assessment Program Jump to: navigation, search Name Senegal-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization --Sean Esterly (talk)...

  19. Argentina-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    UNEP Risoe Technology Needs Assessment Program Jump to: navigation, search Name Argentina-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe...

  20. Indonesia-UNEP Risoe Technology Needs Assessment Program | Open...

    Open Energy Info (EERE)

    Risoe Technology Needs Assessment Program Jump to: navigation, search Name Argentina-UNEP Risoe-Technology Needs Assessment Program AgencyCompany Organization UNEP-Risoe Centre...

  1. Senior Technical Safety Manager Qualification Program Self-Assessment...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of...

  2. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Environmental Management (EM)

    NSTB Summarizes Vulnerable Areas NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered some common areas of vulnerability in the energy control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. PDF icon NSTB Summarizes Vulnerable Areas More Documents & Publications Lessons Learned from Cyber Security Assessments of SCADA and Energy

  3. Assessing Revenue Streams: What Is Right for Your Program?

    Broader source: Energy.gov [DOE]

    Program Sustainability Peer Exchange Call: Assessing Revenue Streams: What is Right for Your Program? Call Slides and Summary, January 10, 2013, The purpose of this call was to discuss how programs are assessing potential revenue streams. Michael Donovan discussed an approach for identifying and assessing potential program revenue streams from customers, contractors, and others based on his work with the LEAP program in Virginia.

  4. Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Federick T.; Schlicher, Bob G

    2015-01-01

    There are many influencing economic factors to weigh from the defender-practitioner stakeholder point-of-view that involve cost combined with development/deployment models. Some examples include the cost of countermeasures themselves, the cost of training and the cost of maintenance. Meanwhile, we must better anticipate the total cost from a compromise. The return on investment in countermeasures is essentially impact costs (i.e., the costs from violating availability, integrity and confidentiality / privacy requirements). The natural question arises about choosing the main risks that must be mitigated/controlled and monitored in deciding where to focus security investments. To answer this question, we have investigated the cost/benefits to the attacker/defender to better estimate risk exposure. In doing so, it s important to develop a sound basis for estimating the factors that derive risk exposure, such as likelihood that a threat will emerge and whether it will be thwarted. This impact assessment framework can provide key information for ranking cybersecurity threats and managing risk.

  5. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  6. Acquisition Guide Chapter 1.3 - Balanced Scorecard Assessment Program -

    Energy Savers [EERE]

    (March 2004) | Department of Energy 3 - Balanced Scorecard Assessment Program - (March 2004) Acquisition Guide Chapter 1.3 - Balanced Scorecard Assessment Program - (March 2004) Acquisition Guide -------------------------------------------- ------------------------------------Chapter 1.2 (March 2004) Balanced Scorecard Performance Assessment Program [This guidance was previously included in Acquisition Letter 98-10] Guiding Principle The Balanced Scorecard program ensures that there is an

  7. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... unauthorized DER connection or operational settings changes, maliciously using demand-response capabilities, gaining unauthorized access to cloud-based PMU information to ...

  8. Technical Qualification Program and FTCP Assessment CRADs | Department of

    Energy Savers [EERE]

    Energy and FTCP Assessment CRADs Technical Qualification Program and FTCP Assessment CRADs This document provides guidance and objectives and criteria to support assessments required by DOE O 426.1 Federal Technical Capability (FTC), Section 4. REQUIREMENTS, paragraph b. FTC Program Implementation, subparagraph (7) Self-Assessment. PDF icon FTCP and TQP Assessment CRADs, 2012 More Documents & Publications Technical Qualification Program Self-Assessment Report - Richland Operations Office

  9. Technical Qualification Program Self-Assessment Report - Los...

    Energy Savers [EERE]

    2014 Technical Qualification Program Self-Assessment Report - Los Alamos Field Office - 2014 This self-assessment for the Verification of the Closure of Federal Training &...

  10. Technical Qualification Program Self-Assessment Report - Los...

    Energy Savers [EERE]

    5 Technical Qualification Program Self-Assessment Report - Los Alamos Field Office - FY15 The FY15 self-assessment of the Technical Qualifications and Federal Technical Capabilit...

  11. Technical Qualification Program Self-Assessment Report - Los...

    Energy Savers [EERE]

    Site Office - 2013 Technical Qualification Program Self-Assessment Report - Los Alamos Site Office - 2013 This self-assessment of the Technical Qualifications and Federal Technical...

  12. Technical Qualification Program Self-Assessment Report - Los...

    Office of Environmental Management (EM)

    Site Office - 2007 Technical Qualification Program Self-Assessment Report - Los Alamos Site Office - 2007 The Federal Technical Capability Manual requires periodic self-assessment...

  13. Assessing Revenue Streams: What Is Right for Your Program? |...

    Broader source: Energy.gov (indexed) [DOE]

    Assessing Revenue Streams: What is Right for Your Program? Call Slides and Summary, January 10, 2013, The purpose of this call was to discuss how programs are assessing potential...

  14. ELECTRIC INFRASTRUCTURE TECHNOLOGY, TRAINING, AND ASSESSMENT PROGRAM

    SciTech Connect (OSTI)

    TREMEL, CHARLES L

    2007-06-28

    The objective of this Electric Infrastructure Technology, Training and Assessment Program was to enhance the reliability of electricity delivery through engineering integration of real-time technologies for wide-area applications enabling timely monitoring and management of grid operations. The technologies developed, integrated, tested and demonstrated will be incorporated into grid operations to assist in the implementation of performance-based protection/preventive measures into the existing electric utility infrastructure. This proactive approach will provide benefits of reduced cost and improved reliability over the typical schedule-based and as needed maintenance programs currently performed by utilities. Historically, utilities have relied on maintenance and inspection programs to diagnose equipment failures and have used the limited circuit isolation devices, such as distribution main circuit breakers to identify abnormal system performance. With respect to reliable problem identification, customer calls to utility service centers are often the sole means for utilities to identify problem occurrences and determine restoration methodologies. Furthermore, monitoring and control functions of equipment and circuits are lacking; thus preventing timely detection and response to customer outages. Finally, the two-way flow of real-time system information is deficient, depriving decision makers of key information required to effectively manage and control current electric grid demands to provide reliable customer service in abnormal situations. This Program focused on advancing technologies and the engineering integration required to incorporate them into the electric grid operations to enhance electrical system reliability and reduce utility operating costs.

  15. Introduction to Property-Assessed Clean Energy (PACE) Financing Programs

    Broader source: Energy.gov [DOE]

    This webinar, held on Nov. 11, 2009, provides information on property-assessed clean energy financing programs.

  16. Technical Qualification Program Self-Assessment Report - Los Alamos Field

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office - FY14 | Department of Energy 4 Technical Qualification Program Self-Assessment Report - Los Alamos Field Office - FY14 The FY14 self-assessment of the Technical Qualifications Program and Federal Technical Capabilities Program was conducted to provide Los Alamos Field Office (NA-LA) management specific information related to effectiveness of the documentation and implementation of these programs. The conclusion of this assessment is that the areas assessed herein are compliant with

  17. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  18. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spillmore » Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.« less

  19. Approach for assessing coastal vulnerability to oil spills for prevention and readiness using GIS and the Blowout and Spill Occurrence Model

    SciTech Connect (OSTI)

    Nelson, J. R.; Grubesic, T. H.; Sim, L.; Rose, K.; Graham, J.

    2015-08-01

    Increasing interest in offshore hydrocarbon exploration has pushed the operational fronts associated with exploration efforts further offshore into deeper waters and more uncertain subsurface settings. This has become particularly common in the U.S. Gulf of Mexico. In this study we develop a spatial vulnerability approach and example assessment to support future spill prevention and improve future response readiness. This effort, which is part of a larger integrated assessment modeling spill prevention effort, incorporated economic and environmental data, and utilized a novel new oil spill simulation model from the U.S. Department of Energy’s National Energy Technology Laboratory, the Blowout and Spill Occurrence Model (BLOSOM). Specifically, this study demonstrated a novel approach to evaluate potential impacts of hypothetical spill simulations at varying depths and locations in the northern Gulf of Mexico. The simulations are analyzed to assess spatial and temporal trends associated with the oil spill. The approach itself demonstrates how these data, tools and techniques can be used to evaluate potential spatial vulnerability of Gulf communities for various spill scenarios. Results of the hypothetical scenarios evaluated in this study suggest that under conditions like those simulated, a strong westward push by ocean currents and tides may increase the impacts of deep water spills along the Texas coastline, amplifying the vulnerability of communities on the local barrier islands. Ultimately, this approach can be used further to assess a range of conditions and scenarios to better understand potential risks and improve informed decision making for operators, responders, and stakeholders to support spill prevention as well as response readiness.

  20. Senior Technical Safety Manager Qualification Program Self-Assessment -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Chief of Nuclear Safety | Department of Energy Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety Senior Technical Safety Manager Qualification Program Self-Assessment - Chief of Nuclear Safety A self-assessment of the CNS Senior Technical Safety Manager (STSM) Qualification Program was conducted during the week of July 8, 2013, when all STSM-qualified staff members were present in Germantown, Maryland. This was the first self-assessment that CNS

  1. Technical Qualification Program Self-Assessment Report - Los Alamos Field

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office - FY15 | Department of Energy 5 Technical Qualification Program Self-Assessment Report - Los Alamos Field Office - FY15 The FY15 self-assessment of the Technical Qualifications and Federal Technical Capabilit program was conducted to provide Los Alamos Field Office (NA-LA) management specific information related to effectiveness of the documentation and implementation of these programs. The conclusion of this assessment is that the areas assessed herein are compliant with the

  2. Technical Qualification Program Self-Assessment Report - Los Alamos Site

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Office - 2013 | Department of Energy Site Office - 2013 Technical Qualification Program Self-Assessment Report - Los Alamos Site Office - 2013 This self-assessment of the Technical Qualifications and Federal Technical Capability program was conducted to provide Los Alamos Field Office management specific information related to effectiveness of the documentation and implementation of these programs. The conclusion of this assessment is that the areas assessed herein are compliant with the

  3. Environmental Assessment Radioactive Source Recovery Program

    SciTech Connect (OSTI)

    1995-12-20

    In a response to potential risks to public health and safety, the U.S. Department of Energy (DOE) is evaluating the recovery of sealed neutron sources under the Radioactive Source Recovery Program (RSRP). This proposed program would enhance the DOE`s and the U.S. Nuclear Regulatory Commission`s (NRC`s) joint capabilities in the safe management of commercially held radioactive source materials. Currently there are no federal or commercial options for the recovery, storage, or disposal of sealed neutron sources. This Environmental Assessment (EA) analyzes the potential environmental impacts that would be expected to occur if the DOE were to implement a program for the receipt and recovery at the Los Alamos National Laboratory (LANL), Los Alamos, New Mexico, of unwanted and excess plutonium-beryllium ({sup 238}Pu-Be) and americium-beryllium ({sup 241}Am-Be) sealed neutron sources. About 1 kg (2.2 lb) plutonium and 3 kg (6.6 lb) americium would be recovered over a 15-year project. Personnel at LANL would receive neutron sources from companies, universities, source brokers, and government agencies across the country. These neutron sources would be temporarily stored in floor holes at the CMR Hot Cell Facility. Recovery reduces the neutron emissions from the source material and refers to a process by which: (1) the stainless steel cladding is removed from the neutron source material, (2) the mixture of the radioactive material (Pu-238 or Am-241) and beryllium that constitutes the neutron source material is chemically separated (recovered), and (3) the recovered Pu-238 or Am-241 is converted to an oxide form ({sup 238}PuO{sub 2} or {sup 241}AmO{sub 2}). The proposed action would include placing the {sup 238}PuO{sub 2} or {sup 241}AmO{sub 2} in interim storage in a special nuclear material vault at the LANL Plutonium Facility.

  4. NANA Geothermal Assessment Program Final Report

    SciTech Connect (OSTI)

    Jay Hermanson

    2010-06-22

    In 2008, NANA Regional Corporation (NRC) assessed geothermal energy potential in the NANA region for both heat and/or electricity production. The Geothermal Assessment Project (GAP) was a systematic process that looked at community resources and the community's capacity and desire to develop these resources. In October 2007, the US Department of Energy's Tribal Energy Program awarded grant DE-FG36-07GO17075 to NRC for the GAP studies. Two moderately remote sites in the NANA region were judged to have the most potential for geothermal development: (1) Granite Mountain, about 40 miles south of Buckland, and (2) the Division Hot Springs area in the Purcell Mountains, about 40 miles south of Shungnak and Kobuk. Data were collected on-site at Granite Mountain Hot Springs in September 2009, and at Division Hot Springs in April 2010. Although both target geothermal areas could be further investigated with a variety of exploration techniques such as a remote sensing study, a soil geochemical study, or ground-based geophysical surveys, it was recommended that on-site or direct heat use development options are more attractive at this time, rather than investigations aimed more at electric power generation.

  5. Enterprise Assessments Review of Explosives Safety Program Implementation

    Energy Savers [EERE]

    at the Pantex Plant - November 2015 | Department of Energy Explosives Safety Program Implementation at the Pantex Plant - November 2015 Enterprise Assessments Review of Explosives Safety Program Implementation at the Pantex Plant - November 2015 November 2015 Review of the Explosives Safety Program Implementation at the Pantex Plant The U.S. Department of Energy (DOE) Office of Enterprise Assessments (EA), Office of Environment, Safety and Health Assessments, conducted an independent review

  6. Property-Assessed Clean Energy Programs | Department of Energy

    Energy Savers [EERE]

    Property-Assessed Clean Energy Programs Property-Assessed Clean Energy Programs The property-assessed clean energy (PACE) model is an innovative mechanism for financing energy efficiency and renewable energy improvements on private property. PACE programs allow local governments, state governments, or other inter-jurisdictional authorities, when authorized by state law, to fund the up-front cost of energy improvements on commercial and residential properties, which are paid back over time by the

  7. NANA Wind Resource Assessment Program Final Report

    SciTech Connect (OSTI)

    Jay Hermanson

    2010-09-23

    NANA Regional Corporation (NRC) of northwest Alaska is located in an area with abundant wind energy resources. In 2007, NRC was awarded grant DE-FG36-07GO17076 by the US Department of Energy's Tribal Energy Program for funding a Wind Resource Assessment Project (WRAP) for the NANA region. The NANA region, including Kotzebue Electric Association (KEA) and Alaska Village Electric Cooperative (AVEC) have been national leaders at developing, designing, building, and operating wind-diesel hybrid systems in Kotzebue (starting in 1996) and Selawik (2002). Promising sites for the development of new wind energy projects in the region have been identified by the WRAP, including Buckland, Deering, and the Kivalina/Red Dog Mine Port Area. Ambler, Shungnak, Kobuk, Kiana, Noorvik & Noatak were determined to have poor wind resources at sites in or very near each community. However, all five of these communities may have better wind resources atop hills or at sites with slightly higher elevations several miles away.

  8. Technical Qualification Program Self-Assessment Report - Los...

    Office of Environmental Management (EM)

    1 Technical Qualification Program Self-Assessment Report - Los Alamos Site Office - 2011 The purpose of the FTCP TQP self-assessment team evaluation was to conduct a thorough...

  9. Self-assessment program implementation plan. Revision A

    SciTech Connect (OSTI)

    Quets, A.L.

    1991-10-23

    This implementation plan identifies and describes the tasks that must be completed in order to successfully implement a Self-Assessment (SA) Program. The purpose of the Self-Assessment Program is to comply with applicable Department of Energy (DOE) directives and orders, Federal, State, and local regulations, operate the Pinellas Plant according to best management practices, and achieve excellence in all operating areas. The Self-Assessment Program will be applied to the Pinellas Plant facility which includes buildings, grounds, equipment, operations, and activities under the control of line management. Furthermore, all applicable disciplines under environmental protection, safety, health and management will be covered by the program. The Self-Assessment Program has been designed to accomplish the following tasks: define the scope of the Self-Assessment Program; assign organizational roles and responsibilities; address EH and S functional elements and management issues; develop a Self-Assessment program charter and policy; identify all applicable EH and S codes, regulations and standards; develop self-assessment procedures and instructions; generate a Self-Assessment Manual; develop a master schedule for facility appraisals and audits; design checklists and report formats for recording appraisal data; implement an assessment tracking and reporting system; implement a root cause analysis and corrective action system; implement a trend analysis and lessons learned system; and establish a formal training program.

  10. Technical Qualification Program Self-Assessment Report - Nevada Field

    Energy Savers [EERE]

    Office - 2014 | Department of Energy Nevada Field Office - 2014 Technical Qualification Program Self-Assessment Report - Nevada Field Office - 2014 This self-assessment examined how the Nevada Field Office (NFO) implements the FTCP and TQP as measured by the current FTCP criteria review and approach documents (CRADs) included in the assessment plan. The self-assessment was conducted April 21 - May 5, 2014. PDF icon NNSA-NFO TQP Self-Assessment, May 2014 More Documents & Publications

  11. Second Line of Defense Spares Program Assessment

    SciTech Connect (OSTI)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energys (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  12. Needs Assessment - Resource Program - Fact Sheet - March 2009

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    power system supply to meet its expected obligations. This is the role of the needs assessment. This is the fi rst time BPA has done a Resource Program since 1992, and a lot has...

  13. 1992-1993 Low-Temperature Geothermal Assessment Program, Colorado...

    Open Energy Info (EERE)

    -1993 Low-Temperature Geothermal Assessment Program, Colorado Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: 1992-1993 Low-Temperature Geothermal...

  14. National Weatherization Assistance Program Evaluation: Assessment of Refrigerator Energy Use

    SciTech Connect (OSTI)

    Tonn, Bruce Edward; Goeltz, Rick

    2015-03-01

    This report assesses the energy consumption characteristics and performance of refrigerators that were monintored as a component of the Indoor Air Quality Study that itself was a component of the retrospective evaluation of the Department of Energy's Weatherization Assistance Program.

  15. PRIVACY IMPACT ASSESSMENT: INL Education Programs PIA Template

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Education Programs PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I -

  16. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    SciTech Connect (OSTI)

    Not Available

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  17. Technical Qualification Program Self-Assessment Report - Richland

    Energy Savers [EERE]

    Operations Office - 2014 | Department of Energy Richland Operations Office - 2014 Technical Qualification Program Self-Assessment Report - Richland Operations Office - 2014 The Richland Operations Office (RL) Technical Qualification Program Plan establishes a process to objectively determine that individuals performing activities related to the technical support, management, oversight, or operation possess the necessary knowledge, skills, and abilities to perform their assigned duties and

  18. Self-Assessment Standard for DOE Contractor Criticality Safety Programs

    Energy Savers [EERE]

    10 March 2010 DOE STANDARD SELF-ASSESSMENT STANDARD FOR DOE CONTRACTOR CRITICALITY SAFETY PROGRAMS DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE This document is available on the Department of Energy Technical Standards Program Web Page at http://www.hss.energy.gov/nuclearsafety/ns/techstds/ DOE-STD-1158-2010 iii TABLE OF CONTENTS FOREWORD

  19. International DSM and DSM program evaluation: An INDEEP assessment

    SciTech Connect (OSTI)

    Vine, E.

    1995-04-01

    This paper discusses the current level of demand-side management (DSM) occurring in selected European countries and reviews the availability of information on DSM programs and program evaluation. Next, thirteen European DSM programs are compared by examining such factors as: motivations for program implementation, marketing methods, participation rates, total energy savings, and program costs. The transfer of DSM program results and experiences found in these case studies is also discussed, as well as the lessons learned during the design, implementation, and evaluation of these programs. This paper represents a preliminary assessment of the state of DSM and DSM program evaluation in Europe. The findings from this work also represent the first steps in a joint international effort to compile and analyze the measured results of energy efficiency programs in a consistent and comprehensive fashion. The authors find that these programs represent cost-effective resources: the cost of energy saved by the programs ranged from a low of 0.0005 ECUs/kWh (0.01 {cents}/kWh) to a high of 0.077 ECUs/kWh (9.7 {cents}/kWh), with an average cost of 0.027 ECUs/kWh (3.3 {cents}/kWh). Weighted by energy savings, the average cost of energy saved by the programs was 0.014 ECUs/kWh (1.8 {cents}/kWh).

  20. Environmental Assessment : Squawfish Management Program : Final.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    1992-05-01

    Bonneville Power Administration (BPA) proposes to decrease the number of northern squawfish (Ptychocheilus oregonensis) in reservoirs in the Columbia River system. The goal of the Squawfish Management Program is to reduce losses of outmigrating juvenile salmon and steelhead (salmonids) to northern squawfish predation. The objective is to reduce the number of northern squawfish that feed on juvenile salmonids (smolts) by 10 to 20 percent to alter the age and size structure of the northern squawfish population. The hypothesis, based on computer modeling, indicates that sustained northern squawfish harvest (5 to 10 years) and the resultant population restructuring may reduce losses of juvenile salmonids to predation by up to 50 percent or more within 10 years. The proposed action would target northern squawfish 11 inches and longer, the size in which northern squawfish being preying significantly on juvenile salmonids. BPA proposes to fund three types of fisheries to harvest northern squawfish. BPA also proposes to fund monitoring activities of these fisheries to determine whether desired or other results occur. The three fisheries methods proposed are: (1) commercial Tribal fishing; (2) sport reward fishing; and (3) fishing from restricted areas of each dam ( dam angling''). These fisheries were tested in 1990 and 1991.

  1. Environmental Hazards Assessment Program annual report, [June 1992--June 1993

    SciTech Connect (OSTI)

    Not Available

    1993-10-01

    This report, the Environment Hazards Assessment Program (EHAP) Annual Report, is the second of three reports that document activities under the EHAP grant and details progress made during the first year of the grant. The first year was devoted to the development of a working program implementation plan. During the developmental process some key objectives were achieved such as developing a Doctor of Philosophy degree program in Environmental Studies at MUSC (Medical University of South Carolina) and conducting the first Crossroads of Humanity series Round Table Forum. The PIP (Program Implementation Program) details the objectives, management and budgetary basis for the overall management and control of the grant over the next four years, the yearly program plans provide the monthly and day-to-day programmatic and budgetary control by which the PIP was developed.

  2. Enterprise Assessments Targeted Review of the Fire Protection Program at

    Office of Environmental Management (EM)

    the Oak Ridge National Laboratory Irradiated Fuels Examination Laboratory, Building 3525 - September 2015 | Department of Energy Review of the Fire Protection Program at the Oak Ridge National Laboratory Irradiated Fuels Examination Laboratory, Building 3525 - September 2015 Enterprise Assessments Targeted Review of the Fire Protection Program at the Oak Ridge National Laboratory Irradiated Fuels Examination Laboratory, Building 3525 - September 2015 September 2015 Review of Oak Ridge

  3. DOE Office of Science Computing Facility Operational Assessment Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Computing Facility Operational Assessment Program Stephane Ethier Princeton Plasma Physics Lab NUG Meeting, 17 Sep 2007 Objective * The DOE Office of Science is required to conduct an Operational Assessment (OA) Review of the efficiencies in the steady-state operations of each of the DOE Office of Science High Performance Computing (HPC) Facilities. * OMB requirement for capital planning once an asset is procured and operational * Focuses on the measurement of customer results, business

  4. Technical Qualification Program Self-Assessment Report - Los Alamos Field

    Energy Savers [EERE]

    Office - 2014 | Department of Energy Los Alamos Field Office - 2014 Technical Qualification Program Self-Assessment Report - Los Alamos Field Office - 2014 This self-assessment for the Verification of the Closure of Federal Training & Qualification Deficiencies was conducted to provide Los Alamos Field Office (NA-LA) management specific information related to effectiveness of the closure actions for Federal Training and Qualification (T &Q) deficiencies identified by a recent

  5. Technical Qualification Program Self-Assessment Report - NNSA Production

    Energy Savers [EERE]

    Office - 2014 | Department of Energy NNSA Production Office - 2014 Technical Qualification Program Self-Assessment Report - NNSA Production Office - 2014 In preparation for the upcoming Chief for Defense Nuclear Safety (CDNS) review, a self-assessment of NNSA Production Office (NPO) oversight of the B&W Pantex Plant and the Y-12 National Security Complex was completed from October 2013 - January 2014. The scope included all available CDNS Criteria, Review, and Approach Documents (CRADS)

  6. 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Getting the most out of your Safety Assessment

    Broader source: Energy.gov [DOE]

    2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Getting the most out of your Safety Assessment

  7. 2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment

    Broader source: Energy.gov [DOE]

    2009 Voluntary Protection Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment

  8. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    SciTech Connect (OSTI)

    Tidwell, Vincent C.; Wolfsberg, Andrew; Macknick, Jordan; Middleton, Richard

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  9. Enterprise Assessments Targeted Review of the Fire Protection Program at

    Broader source: Energy.gov (indexed) [DOE]

    Y-12 National Security Complex and Pantex Plant - October 2015 | Department of Energy Fire Protection Program at Y-12 National Security Complex and Pantex Plant The U.S. Department of Energy (DOE) independent Office of Enterprise Assessments (EA) conducted a targeted review of the Y-12 National Security Complex (Y-12) and Pantex Plant fire protection programs (FPPs). This review was one part of a larger group of targeted reviews of FPPs at nuclear facilities across the DOE complex. PDF icon

  10. Risk assessment in the DOE Assurance Program for Remedial Action

    SciTech Connect (OSTI)

    Marks, S.; Cross, F.T.; Denham, D.H.; Kennedy, W.E.; Stenner, R.D.

    1985-08-01

    This document provides information obtained during the performance of risk assessment tasks in support of the Assurance Program for Remedial Action (APRA) sponsored by the Office of Operational Safety of the Department of Energy. We have presented a method for the estimation of projected health effects at properties in the vicinity of uranium mill tailing piles due to transported tailings or emissions from the piles. Because radon and radon daughter exposure is identified as the principal factor contributing to health effects at such properties, the basis for estimating lung cancer risk as a result of such exposure is discussed in detail. Modeling of health risk due to a secondary pathway, ingestion of contaminated, home-grown food products, is also discussed since it is a potentially important additional source of exposure in certain geographic locations. Risk assessment methods used in various mill tailings reports are reviewed. The protocols for radiological surveys conducted in DOE-sponsored remedial action programs are critically reviewed with respect to their relevance to the needs of health risk estimation. The relevance of risk assessment to the APRA program is discussed briefly.

  11. Environmental Hazards Assessment Program. Quarterly report, April--June 1995

    SciTech Connect (OSTI)

    1995-07-31

    The objectives of this report are to: (1) develop a holistic, national basis for risk assessment, risk management, and risk communication that recognizes the direct impact of environmental hazards, both chemical and radiation, on the health and well-being of all; (2) develop a pool of talented scientists and experts in cleanup activities, especially in human health aspects; and (3) identify needs and develop programs addressing the critical shortage of well-educated, highly-skilled technical and scientific personnel to address the health oriented aspects of environmental restoration and waste management. This report describes the progress made this quarter in the following areas: public and professional outreach; science programs; clinical programs; and information support and access systems.

  12. SRNL PHASE 1 ASSESSMENT OF THE WTP WASTE QUALIFICATION PROGRAM

    SciTech Connect (OSTI)

    Peeler, D.; Hansen, E.; Herman, C.; Marra, S.; Wilmarth, B.

    2012-03-06

    The Hanford Tank Waste Treatment and Immobilization Plant (WTP) Project is currently transitioning its emphasis from an engineering design and construction phase toward facility completion, start-up and commissioning. With this transition, the WTP Project has initiated more detailed assessments of the requirements that must be met during the actual processing of the Hanford Site tank waste. One particular area of interest is the waste qualification program. In general, the waste qualification program involves testing and analysis to demonstrate compliance with waste acceptance criteria, determine waste processability, and demonstrate laboratory-scale unit operations to support WTP operations. The testing and analysis are driven by data quality objectives (DQO) requirements necessary for meeting waste acceptance criteria for transfer of high-level wastes from the tank farms to the WTP, and for ensuring waste processability including proper glass formulations during processing within the WTP complex. Given the successful implementation of similar waste qualification efforts at the Savannah River Site (SRS) which were based on critical technical support and guidance from the Savannah River National Laboratory (SRNL), WTP requested subject matter experts (SMEs) from SRNL to support a technology exchange with respect to waste qualification programs in which a critical review of the WTP program could be initiated and lessons learned could be shared. The technology exchange was held on July 18-20, 2011 in Richland, Washington, and was the initial step in a multi-phased approach to support development and implementation of a successful waste qualification program at the WTP. The 3-day workshop was hosted by WTP with representatives from the Tank Operations Contractor (TOC) and SRNL in attendance as well as representatives from the US DOE Office of River Protection (ORP) and the Defense Nuclear Facility Safety Board (DNFSB) Site Representative office. The purpose of the workshop was to share lessons learned and provide a technology exchange to support development of a technically defensible waste qualification program. The objective of this report is to provide a review, from SRNL's perspective, of the WTP waste qualification program as presented during the workshop. In addition to SRNL's perspective on the general approach to the waste qualification program, more detailed insight into the specific unit operations presented by WTP during the workshop is provided. This report also provides a general overview of the SRS qualification program which serves as a basis for a comparison between the two programs. Recommendations regarding specific steps are made based on the review and SRNL's lessons learned from qualification of SRS low-activity waste (LAW) and high-level waste (HLW) to support maturation of the waste qualification program leading to WTP implementation.

  13. Field Assessment of Energy Audit Tools for Retrofit Programs

    SciTech Connect (OSTI)

    Edwards, J.; Bohac, D.; Nelson, C.; Smith, I.

    2013-07-01

    This project focused on the use of home energy ratings as a tool to promote energy retrofits in existing homes. A home energy rating provides a quantitative appraisal of a homes energy performance, usually compared to a benchmark such as the average energy use of similar homes in the same region. Rating systems based on energy performance models, the focus of this report, can establish a homes achievable energy efficiency potential and provide a quantitative assessment of energy savings after retrofits are completed, although their accuracy needs to be verified by actual measurement or billing data. Ratings can also show homeowners where they stand compared to their neighbors, thus creating social pressure to conform to or surpass others. This project field-tested three different building performance models of varying complexity, in order to assess their value as rating systems in the context of a residential retrofit program: Home Energy Score, SIMPLE, and REM/Rate.

  14. Assessment of the O2Diesel Operational Safety Program: December 23, 2002 -- June 30, 2007

    SciTech Connect (OSTI)

    TIAX LLC

    2006-06-01

    This report assesses O2Diesel's operational safety program using its ethanol-diesel blended fuel product.

  15. Final Environmental assessment for the Uranium Lease Management Program

    SciTech Connect (OSTI)

    1995-07-01

    The US Department of Energy (DOE) has prepared a programmatic environmental assessment (EA) of the proposed action to continue leasing withdrawn lands and DOE-owned patented claims for the exploration and production of uranium and vanadium ores. The Domestic Uranium Program regulation, codified at Title 10, Part 760.1, of the US Code of Federal Regulations (CFR), gives DOE the flexibility to continue leasing these lands under the Uranium Lease Management Program (ULMP) if the agency determines that it is in its best interest to do so. A key element in determining what is in DOE`s ``best interest`` is the assessment of the environmental impacts that may be attributable to lease tract operations and associated activities. On the basis of the information and analyses presented in the EA for the ULMP, DOE has determined that the proposed action does not constitute a major Federal action significantly affecting the quality of the human environment, as defined in the National Environmental Policy Act (NEPA) of 1969 (42 United States Code 4321 et seq.), as amended.Therefore, preparation of an environmental impact statement is not required for the ULMP,and DOE is issuing this Finding, of No Significant Impact (FONSI).

  16. Enterprise Assessments Review of the Pantex Plant Emergency Management Exercise Program … November 2015

    Office of Environmental Management (EM)

    Pantex Plant Emergency Management Exercise Program November 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  17. Enterprise Assessments Review of the Savannah River Site Emergency Management Exercise Program … November 2015

    Office of Environmental Management (EM)

    Savannah River Site Emergency Management Exercise Program November 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ..................................................................................................................................................... ii Executive Summary

  18. Technology Assessment and Roadmap for the Emergency Radiation Dose Assessment Program

    SciTech Connect (OSTI)

    Turteltaub, K W; Hartman-Siantar, C; Easterly, C; Blakely, W

    2005-10-03

    A Joint Interagency Working Group (JIWG) under the auspices of the Department of Homeland Security Office of Research and Development conducted a technology assessment of emergency radiological dose assessment capabilities as part of the overall need for rapid emergency medical response in the event of a radiological terrorist event in the United States. The goal of the evaluation is to identify gaps and recommend general research and development needs to better prepare the Country for mitigating the effects of such an event. Given the capabilities and roles for responding to a radiological event extend across many agencies, a consensus of gaps and suggested development plans was a major goal of this evaluation and road-mapping effort. The working group consisted of experts representing the Departments of Homeland Security, Health and Human Services (Centers for Disease Control and the National Institutes of Health), Food and Drug Administration, Department of Defense and the Department of Energy's National Laboratories (see appendix A for participants). The specific goals of this Technology Assessment and Roadmap were to: (1) Describe the general context for deployment of emergency radiation dose assessment tools following terrorist use of a radiological or nuclear device; (2) Assess current and emerging dose assessment technologies; and (3) Put forward a consensus high-level technology roadmap for interagency research and development in this area. This report provides a summary of the consensus of needs, gaps and recommendations for a research program in the area of radiation dosimetry for early response, followed by a summary of the technologies available and on the near-term horizon. We then present a roadmap for a research program to bring present and emerging near-term technologies to bear on the gaps in radiation dose assessment and triage. Finally we present detailed supporting discussion on the nature of the threats we considered, the status of technology today, promising emerging technologies and references for further reading.

  19. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  20. A Regional Climate Change Assessment Program for North America

    SciTech Connect (OSTI)

    Mearns, L. O.; Gutowski, William; Jones, Richard; Leung, Lai-Yung R.; McGinnis, Seth; Nunes, A.; Qian, Yun

    2009-09-08

    There are two main uncertainties in determining future climate: the trajectories of future emissions of greenhouse gases and aerosols, and the response of the global climate system to any given set of future emissions [Meehl et al., 2007]. These uncertainties normally are elucidated via application of global climate models, which provide information at relatively coarse spatial resolutions. Greater interest in, and concern about, the details of climate change at regional scales has provided the motivation for the application of regional climate models, which introduces additional uncertainty [Christensen et al., 2007a]. These uncertainties in fi ne- scale regional climate responses, in contrast to uncertainties of coarser spatial resolution global models in which regional models are nested, now have been documented in numerous contexts [Christensen et al., 2007a] and have been found to extend to uncertainties in climate impacts [Wood et al., 2004; Oleson et al., 2007]. While European research in future climate projections has moved forward systematically to examine combined uncertainties from global and regional models [Christensen et al., 2007b], North American climate programs have lagged behind. To fi ll this research gap, scientists developed the North American Regional Climate Change Assessment Program (-NARCCAP). The fundamental scientifi c motivation of this international program is to explore separate and combined uncertainties in regional projections of future climate change resulting from the use of multiple atmosphere- ocean general circulation models (AOGCMs) to drive multiple regional climate models (RCMs). An equally important, and related, motivation for this program is to provide the climate impacts and adaptation community with high- resolution regional climate change scenarios that can be used for studies of the societal impacts of climate change and possible adaptation strategies.

  1. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  2. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  3. National Acid Precipitation Assessment Program Report to Congress: An Integrated Assessment

    SciTech Connect (OSTI)

    Uhart, M.; et al,

    2005-08-01

    Under Title IX of the 1990 Clean Air Act Amendments, Congress reauthorized the National Acid Precipitation Assessment Program (NAPAP) to continue coordinating acid rain research and monitoring, as it had done during the previous decade, and to provide Congress with periodic reports. In particular, Congress asked NAPAP to assess all available data and information to answer two questions: (1) What are the costs, benefits, and effectiveness of Title IV? This question addresses the costs and economic impacts of complying with the Acid Rain Program as well as benefit analyses associated with the various human health and welfare effects, including reduced visibility, damages to materials and cultural resources, and effects on ecosystems. (2) What reductions in deposition rates are needed to prevent adverse ecological effects? This complex questions addresses ecological systems and the deposition levels at which they experience harmful effects. The results of the assessment of the effects of Title IV and of the relationship between acid deposition rates and ecological effects were to be reported to Congress quadrennially, beginning with the 1996 report to Congress. The objective of this Report is to address the two main questions posed by Congress and fully communicate the results of the assessment to decision-makers. Given the primary audience, most of this report is not written as a technical document, although information supporting the conclusions is provided along with references.

  4. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industries | Department of Energy Assessment Helps Expand Energy Management Program at Shaw Industries Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries This case study details how a DOE energy assessment helped Shaw Industries identify significant energy savings opportunities in their Dalton, Georgia, plant's steam system. PDF icon Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries (July 2008) More Documents &

  5. Field Assessment of Energy Audit Tools for Retrofit Programs

    SciTech Connect (OSTI)

    Edwards, J.; Bohac, D.; Nelson, C.; Smith, I.

    2013-07-01

    This project focused on the use of home energy ratings as a tool to promote energy retrofits in existing homes. A home energy rating provides a quantitative appraisal of a home's asset performance, usually compared to a benchmark such as the average energy use of similar homes in the same region. Home rating systems can help motivate homeowners in several ways. Ratings can clearly communicate a home's achievable energy efficiency potential, provide a quantitative assessment of energy savings after retrofits are completed, and show homeowners how they rate compared to their neighbors, thus creating an incentive to conform to a social standard. An important consideration is how rating tools for the retrofit market will integrate with existing home energy service programs. For residential programs that target energy savings only, home visits should be focused on key efficiency measures for that home. In order to gain wide adoption, a rating tool must be easily integrated into the field process, demonstrate consistency and reasonable accuracy to earn the trust of home energy technicians, and have a low monetary cost and time hurdle for homeowners. Along with the Home Energy Score, this project also evaluated the energy modeling performance of SIMPLE and REM/Rate.

  6. Study of Risk Assessment Programs at Federal Agencies and Commercial Industry Related to the Conduct or Regulation of High Hazard Operations

    SciTech Connect (OSTI)

    Bari, R.; Rosenbloom, S.; O'Brien, J.

    2011-03-13

    In the Department of Energy (DOE) Implementation Plan (IP) for Defense Nuclear Facilities Safety Board's Recommendation 2009-1, the DOE committed to studying the use of quantitative risk assessment methodologies at government agencies and industry. This study consisted of document reviews and interviews of senior management and risk assessment staff at six organizations. Data were collected and analyzed on risk assessment applications, risk assessment tools, and controls and infrastructure supporting the correct usage of risk assessment and risk management tools. The study found that the agencies were in different degrees of maturity in the use of risk assessment to support the analysis of high hazard operations and to support decisions related to these operations. Agencies did not share a simple, 'one size fits all' approach to tools, controls, and infrastructure needs. The agencies recognized that flexibility was warranted to allow use of risk assessment tools in a manner that is commensurate with the complexity of the application. The study also found that, even with the lack of some data, agencies application of the risk analysis structured approach could provide useful insights such as potential system vulnerabilities. This study, in combination with a companion study of risk assessment programs in the DOE Offices involved in high hazard operations, is being used to determine the nature and type of controls and infrastructure needed to support risk assessments at the DOE.

  7. Climate Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  8. Actinide partitioning-transmutation program final report. I. Overall assessment

    SciTech Connect (OSTI)

    Croff, A.G.; Blomeke, J.O.; Finney, B.C.

    1980-06-01

    This report is concerned with an overall assessment of the feasibility of and incentives for partitioning (recovering) long-lived nuclides from fuel reprocessing and fuel refabrication plant radioactive wastes and transmuting them to shorter-lived or stable nuclides by neutron irradiation. The principal class of nuclides considered is the actinides, although a brief analysis is given of the partitioning and transmutation (P-T) of /sup 99/Tc and /sup 129/I. The results obtained in this program permit us to make a comparison of the impacts of waste management with and without actinide recovery and transmutation. Three major conclusions concerning technical feasibility can be drawn from the assessment: (1) actinide P-T is feasible, subject to the acceptability of fuels containing recycle actinides; (2) technetium P-T is feasible if satisfactory partitioning processes can be developed and satisfactory fuels identified (no studies have been made in this area); and (3) iodine P-T is marginally feasible at best because of the low transmutation rates, the high volatility, and the corrosiveness of iodine and iodine compounds. It was concluded on the basis of a very conservative repository risk analysis that there are no safety or cost incentives for actinide P-T. In fact, if nonradiological risks are included, the short-term risks of P-T exceed the long-term benefits integrated over a period of 1 million years. Incentives for technetium and iodine P-T exist only if extremely conservative long-term risk analyses are used. Further RD and D in support of P-T is not warranted.

  9. Technical Qualification Program Self-Assessment Report- Pacific Northwest Site Office- 2013

    Broader source: Energy.gov [DOE]

    This self-assessment evaluated how well the Technical Qualification and Federal Capability Programs were implemented at the Pacific Northwest Site Office (PNSO).

  10. Technical Qualification Program Self-Assessment Report- Sandia Site Office- 2012

    Broader source: Energy.gov [DOE]

    This self assessment examined how Sandia Site Office (SSO) executes the Technical Qualification Program (TQP) as measured by the current Federal Technical Capability Panel criteria review and approach documents (CRADs) included in the assessment plan.

  11. Technical Qualification Program Self-Assessment Report- Savannah River Site Office- 2011

    Broader source: Energy.gov [DOE]

    This self assessment evaluates the effective implementation of the Technical Qualification Programs (TQP). The Federal Technical Capability Panel (FTCP) also reviews the results of the TQP self-assessments and determines if further action is necessary on a Departmental level.

  12. Technical Qualification Program and FTCP Self-Assessment Report- Idaho Operations Office- 2015

    Broader source: Energy.gov [DOE]

    The Department of Energy Idaho Operations Office conducted a management self-assessment of the DOE-ID Technical Qualification Program and Federal Technical Capability Program from October 26 thru December 15, 2015. The management self-assessment was conducted by the Assistant Manager, Nuclear and Safety Performance (also the Federal Technical Capabilities Panel Agent) and a Facility Representative.

  13. Technical Qualification Program Self-Assessment Report- Office of Health, Safety and Security- 2014

    Broader source: Energy.gov [DOE]

    Beginning in April 2014, a self-assessment of the Technical Qualification Program (TQP) was performed in the Office of Health, Safety and Security (HSS). The assessment was led by the HSS TQP Manager who is assigned the responsibility for maintaining and implementing the programs.

  14. Enterprise Assessments Review of Explosives Safety Program Implementat...

    Office of Environmental Management (EM)

    explosives in support of the NNSA stockpile stewardship program. Pantex also conducts synthesis, manufacturing, and machining of insensitive and conventional high explosives for...

  15. Assessing the Costs and Benefits of the Superior Energy Performance Program

    Office of Environmental Management (EM)

    | Department of Energy Technical Assistance » Superior Energy Performance » Assessing the Costs and Benefits of the Superior Energy Performance Program Assessing the Costs and Benefits of the Superior Energy Performance Program Superior Energy Performance logo This paper focuses on the business value of Superior Energy Performance® (SEP(tm)) and ISO 50001, providing an assessment of the costs and benefits associated with SEP implementation at nine SEP-certified facilities across a variety

  16. Save Energy Now Assessment Helps Expand Energy Management Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    helped Shaw Industries identify significant energy savings opportunities in their Dalton, Georgia, plant's steam system. PDF icon Save Energy Now Assessment Helps Expand...

  17. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  18. Technical Qualification Program Self-Assessment Report- Carlsbad Field Office- 2012

    Broader source: Energy.gov [DOE]

    Management Assessment (MA-12-08) was conducted from October 1-31, 2012. The management assessment team evaluated the specific requirement implementation, processes, and performance areas of the CBFO Technical Qualification Program (TQP). The assessment covered the relevant parts of DOE 0 426.1, Federal Technical Capability.

  19. Enterprise Assessments Review of the Nevada National Security Site Fire Protection Program … October 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nevada National Security Site Fire Protection Program October 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  20. Enterprise Assessments Review of Explosives Safety Program Implementation at the Pantex Plant … November 2015

    Office of Environmental Management (EM)

    Review of Explosives Safety Program Implementation at the Pantex Plant November 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  1. Environmental hazards assessment program. Annual report, July 1, 1994--June 30, 1995

    SciTech Connect (OSTI)

    1995-07-31

    This report describes activities and reports on progress for the third year of the DOE grant to support the Environmental Hazards Assessment Program (EHAP). It reports progress against grant objectives and the Program Implementation Plan published at the end of the first year of the grant. As the program has evolved, more projects have been funded and many existing projects have become more complex. Thus, to accomplish better the objectives over the years and retain a solid focus on the total mission, we have reorganized the grant effort from three to five majoe elements: Public and professional outreach; Clinical programs; Science programs; Information systems; and, Program management.

  2. Status of SRS Liquid Waste Performance Assessment Program

    Broader source: Energy.gov [DOE]

    Presentation from the 2015 Annual Performance and Risk Assessment (P&RA) Community of Practice (CoP) Technical Exchange Meeting held in Richland, Washington on December 15-16, 2015.

  3. Technical Qualification Program Self-Assessment Report - NNSA...

    Broader source: Energy.gov (indexed) [DOE]

    the upcoming Chief for Defense Nuclear Safety (CDNS) review, a self-assessment of NNSA Production Office (NPO) oversight of the B&W Pantex Plant and the Y-12 National Security...

  4. Technical Qualification Program Self-Assessment Report- Office of River Protection- 2014

    Broader source: Energy.gov [DOE]

    A self-assessment was performed in accordance with TRS-OA-IP-07, Management (Self) Assessment, Rev. 2, where information was retrieved from MGT-QT-PL-01, Technical Qualification Program (TQP) Plan, Rev. 3; MGT-QT-DI-01, Technical Qualification Program: Federal Technical Capability Agent Duties, Rev. 2; technical staff electronic training and qualifications files; and ORP's technical staff hard copy training and qualification files to determine the effectiveness of the implemented program and identify any weaknesses of the existing program at turn-over of responsibilities.

  5. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INLs Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendors system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendors) System replaces the name of the specific SCADA/EMS being tested.

  6. DOE site performance assessment activities. Radioactive Waste Technical Support Program

    SciTech Connect (OSTI)

    Not Available

    1990-07-01

    Information on performance assessment capabilities and activities was collected from eight DOE sites. All eight sites either currently dispose of low-level radioactive waste (LLW) or plan to dispose of LLW in the near future. A survey questionnaire was developed and sent to key individuals involved in DOE Order 5820.2A performance assessment activities at each site. The sites surveyed included: Hanford Site (Hanford), Idaho National Engineering Laboratory (INEL), Los Alamos National Laboratory (LANL), Nevada Test Site (NTS), Oak Ridge National Laboratory (ORNL), Paducah Gaseous Diffusion Plant (Paducah), Portsmouth Gaseous Diffusion Plant (Portsmouth), and Savannah River Site (SRS). The questionnaire addressed all aspects of the performance assessment process; from waste source term to dose conversion factors. This report presents the information developed from the site questionnaire and provides a comparison of site-specific performance assessment approaches, data needs, and ongoing and planned activities. All sites are engaged in completing the radioactive waste disposal facility performance assessment required by DOE Order 5820.2A. Each site has achieved various degrees of progress and have identified a set of critical needs. Within several areas, however, the sites identified common needs and questions.

  7. Program Sustainability Peer Exchange Call: Assessing Revenue Streams: What is Right for Your Program? Call Slides and Summary, January 10, 2013

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0, 2013 Program Sustainability Peer Exchange Call: Assessing Revenue Streams: What is Right for Your Program? Call Slides and Summary Agenda * Welcome and Polls * Assessing Revenue Streams: LEAP Example (Virginia)  Michael Donovan, The Donovan Group * Q&A and Discussion  How are other programs assessing potential revenue streams? What lessons have you learned?  What tools, resources, or methods you have found useful?  How have program made the transition to charging new types of

  8. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the

  9. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  10. EPA`s program for risk assessment guidelines: Quantification issues

    SciTech Connect (OSTI)

    Dourson, M.L.

    1990-12-31

    The quantitative procedures associated with noncancer risk assessment include reference dose (RfD), benchmark dose, and severity modeling. The RfD, which is part of the EPA risk assessment guidelines, is an estimation of a level that is likely to be without any health risk to sensitive individuals. The RfD requires two major judgments: the first is choice of a critical effect(s) and its No Observed Adverse Effect Level (NOAEL); the second judgment is choice of an uncertainty factor. This paper discusses major assumptions and limitations of the RfD model.

  11. EPa`s program for risk assessment guidelines: Exposure issues

    SciTech Connect (OSTI)

    Callahan, M.A.

    1990-12-31

    Three major issues to be dealt with over the next ten years in the exposure assessment field are: consistency in terminology, the impact of computer technology on the choice of data and modeling, and conceptual issues such as the use of time-weighted averages.

  12. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries (Brochure)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Based on recommendations from their Save Energy Now assessment, Shaw Industries plant #20 in Dalton, Georgia, installed a waste water heat exchanger on their Kuster dye line to capture excess heat and save a significant amount of money and energy. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries Flooring Company Saves $872,000 Annually by Improving Steam System Efficiency Industrial Technologies Program Case Study Benefits Implemented $872,000 annually in

  13. Technical Qualification Program Self-Assessment Report- Office of Science- 2013

    Broader source: Energy.gov [DOE]

    Under DOE 426.1, Change 1. Headquarters and Field elements must conduct a self-assessment of Technical Qualification Program (TQP) and Federal Technical Capability Program (FTCP) implementation within their organization at least every four years. These assessments must be conducted in accordance with the requirements of DOE Order (0) 226.1 B, Implementation of Department of Energy Oversight Policy, dated 4-25-11, and the current objectives and criteria approved by the FTCP Chair.

  14. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  15. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  16. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  17. Kyiv institutional buildings sector energy efficiency program: Technical assessment

    SciTech Connect (OSTI)

    Secrest, T.J.; Freeman, S.L.; Popelka, A.; Shestopal, P.A.; Gagurin, E.V.

    1997-08-01

    The purpose of this assessment is to characterize the economic energy efficiency potential and investment requirements for space heating and hot water provided by district heat in the stock of state and municipal institutional buildings in the city of Kyiv. The assessment involves three activities. The first is a survey of state and municipal institutions to characterize the stock of institutional buildings. The second is to develop an estimate of the cost-effective efficiency potential. The third is to estimate the investment requirements to acquire the efficiency resource. Institutional buildings are defined as nonresidential buildings owned and occupied by state and municipal organizations. General categories of institutional buildings are education, healthcare, and cultural. The characterization activity provides information about the number of buildings, building floorspace, and consumption of space heating and hot water energy provided by the district system.

  18. An examination of the role of risk assessment in superfund program management, implementation, and evaluation

    SciTech Connect (OSTI)

    Bala, S.

    1995-12-01

    Human health risk assessment is playing an increasing role in the characterization of the nature and extent of human health threats posed by Superfund hazardous waste sites, and the prioritization of these sites for remediation activities. Risk assessment also plays a central role in initiatives to measure and evaluate the program`s progress in remediating these sites, and in efforts to communicate that progress to a diverse audience. This paper examines the current role of risk assessment in Superfund`s program management, implementation, and evaluation activities, and advocates the need for a comprehensive plan to enhance and systematically apply risk assessment information across all of these activities. Specifically, this paper examines the role of risk assessment at three levels: (1) the current role of risk information in Superfund`s program management activities; (2) the current role of risk information in the implementation of site cleanup; (3) profile of Superfund`s approach to measuring, evaluating, and communicating site remediation progress via Environmental Indicators (EIs). Building on this three-level examination, this paper calls for the development of a comprehensive plan for the enhanced and systematic application of risk assessment information in Superfund`s program management, implementation, and evaluation activities. This paper also draws upon the current literature on risk assessment and measurement, risk-based planning and decision-making, and risk communication.

  19. Technical Qualification Program Self-Assessment Report- Nevada Site Office- 2009

    Broader source: Energy.gov [DOE]

    An accreditation assessment of the National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Technical Qualification Program (TQP) was conducted during the week of October 5-8, 2009. The accreditation of the TQP will enable NSO to demonstrate that they have an effective program in place to ensure the technical competency of the individuals performing these activities.

  20. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  1. 1992--1993 low-temperature geothermal assessment program, Colorada

    SciTech Connect (OSTI)

    Cappa, J.A.; Hemborg, H.T.

    1995-01-01

    Previous assessments of Colorado`s low-temperature geothermal resources were completed by the Colorado Geological Survey in 1920 and in the mid- to late-1970s. The purpose of the 1992--1993 low-temperature geothermal resource assessment is to update the earlier physical, geochemical, and utilization data and compile computerized databases of the location, chemistry, and general information of the low-temperature geothermal resources in Colorado. The main sources of the data included published data from the Colorado Geological Survey, the US Geological Survey WATSTOR database, and the files of the State Division of Water Resources. The staff of the Colorado Geological Survey in 1992 and 1993 visited most of the known geothermal sources that were recorded as having temperatures greater than 30{degrees}C. Physical measurements of the conductivity, pH, temperature, flow rate, and notes on the current geothermal source utilization were taken. Ten new geochemical analyses were completed on selected geothermal sites. The results of the compilation and field investigations are compiled into the four enclosed Quattro Pro 4 databases. For the purposes of this report a geothermal area is defined as a broad area, usually less than 3 sq mi in size, that may have several wells or springs. A geothermal site is an individual well or spring within a geothermal area. The 1992-1993 assessment reports that there are 93 geothermal areas in the Colorado, up from the 56 reported in 1978; there are 157 geothermal sites up from the 125 reported in 1978; and a total of 382 geochemical analyses are compiled, up from the 236 reported in 1978. Six geothermal areas are recommended for further investigation: Trimble Hot Springs, Orvis Hot Springs, an area southeast of Pagosa Springs, the eastern San Luis Valley, Rico and Dunton area, and Cottonwood Hot Springs.

  2. Enterprise Assessments Review of the Y-12 National Security Complex Emergency Management Exercise Program … August 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Emergency Management Exercise Program August 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ..................................................................................................................................................... ii Executive Summary

  3. Low-temperature resource assessment program. Final report

    SciTech Connect (OSTI)

    Lienau, P.J.; Ross, H.

    1996-02-01

    The US Department of Energy - Geothermal Division (DOE/GD) recently sponsored the Low-Temperature Resource Assessment project to update the inventory of the nation`s low- and moderate-temperature geothermal resources and to encourage development of these resources. A database of 8,977 thermal wells and springs that are in the temperature range of 20{degrees}C to 150{degrees}C has been compiled for ten western states, an impressive increase of 82% compared to the previous assessments. The database includes location, descriptive data, physical parameters, water chemistry and references for sources of data. Computer-generated maps are also available for each state. State Teams have identified 48 high-priority areas for near-term comprehensive resource studies and development. Resources with temperatures greater than 50{degrees}C located within 8 km of a population center were identified for 271 collocated cities. Geothermal energy cost evaluation software has been developed to quickly identify the cost of geothermally supplied heat to these areas in a fashion similar to that used for conventionally fueled heat sources.

  4. Technical Qualification Program Self-Assessment Report- Los Alamos Site Office- 2007

    Broader source: Energy.gov [DOE]

    The Federal Technical Capability Manual requires periodic self-assessment of the effectiveness of the implementation of the Manual and the Technical Qualification Program utilizing a defined set of Objectives and Criteria. The assessment documented by this report is the first periodic review conducted at LASO to meet this requirement. The assessment results are intended to establish a base-line on which to develop and improve the program so no final grade was assigned; however, only six of the twelve Objectives were identified as being met.

  5. Radiological/Health physics program assessement at Rocky Flats, the process

    SciTech Connect (OSTI)

    Psomas, P.O.

    1996-06-01

    The Department of Energy, Rocky Flats Office, Safety and Health Group, Health Physics Team (HPT) is responsible for oversight of the Radiation Protection and Health Physics Program (RPHP) of the Integrating Management Contractor (IMC), Kaiser-Hill (K-H) operations at the Rocky Flats Environmental Technology Site (RFETS). As of 1 January 1996 the Rocky Flats Plant employed 300 DOE and 4,300 contractor personnel (K-H and their subcontractors). WSI is a subcontractor and provides plant security. To accomplish the RPHP program oversight HPT personnel developed a systematic methodology for performing a functional RPHP Assessment. The initial process included development of a flow diagram identifying all programmatic elements and assessment criteria documents. Formulation of plans for conducting interviews and performance of assessments constituted the second major effort. The generation of assessment reports was the final step, based on the results of this process. This assessment will be a 6 person-year effort, over the next three years. This process is the most comprehensive assessment of any Radiation Protection and Health Physics (RPHP) Program ever performed at Rocky Flats. The results of these efforts will establish a baseline for future RPHP Program assessments at RFETS. This methodology has been well-received by contractor personnel and creates no Privacy Act violations or other misunderstandings.

  6. Radwaste assessment program for nuclear station modifications by design engineering

    SciTech Connect (OSTI)

    Eble, R.G.

    1988-01-01

    Radwaste burial for Duke Power Company's (DPC's) seven nuclear units has become a complicated and costly process. Burial costs are based on overall volume, surcharges for radioactivity content and weight of containers, truck and cask rental, driver fees, and state fees and taxes. Frequently, radwaste costs can be as high as $500 per drum. Additionally, DPC is limited on the total burial space allocated for each plant each year. The thrust of this program is to reduce radwaste volumes needing burial at either Barnwell, South Carolina, or Richland, Washington. A limited number of options are available at our sites: (a) minimization of radwaste volume production, (b) segregation of contamination and noncontaminated trash, (c) decontamination of small hardware, (d) volume reduction of compatible trash, (e) incineration of combustible trash (available at Oconee in near future), and (f) burial of below-regulatory-concern very low level waste on site. Frequently, costs can be reduced by contracting services outside the company, i.e., supercompaction, decontamination, etc. Information about radwaste volumes, activities, and weight, however, must be provided to the nuclear production department (NPD) radwaste group early in the nuclear station modification (NSM) process to determine the most cost-effective method of processing radwaste. In addition, NSM radwaste costs are needed for the NPD NSM project budget. Due to the advanced planning scope of this budget, NSM construction costs must be estimated during the design-phase proposal.

  7. Assessment of the industrial energy-conservation program. Final report of the Committee on Assessment of the Industrial Energy Conservation Program

    SciTech Connect (OSTI)

    1982-01-01

    Industrial operations in the United States account for some 37% of the nation's consumptions of energy. It has been estimated that this figure will increase to 50% by 1990 unless appropriate industrial energy conservation measures are adopted. However, such measures are difficult to implement in spite of the potential of various existing, emerging, and advanced technologies that can be applied to the problem. Specifically, the application of many industrial energy conservation measures entails high economic, technological, and institutional risks and uncertainties that constrain industries from adopting such measures. Accordingly, in 1975 the federal government started a program designed to mitigate these risks and uncertainties via government-industry partnership arrangements in the interests of national energy conservation. An important element of this program is the Industrial Energy Conservation Program in the Federal Department of Energy (DOE). In June 1980, DOE asked the National Materials Advisory Board, a unit of the National Academy of Sciences-National Research Council, to form a study committee to assess the effectiveness of the Industrial Energy Conservation Program. The committee concluded that federal support embodied in the DOE program, present and planned, is important to conserving additional industrial energy. However, the committee also concluded that the program needs various improvements in project selection and management and in transfer of results to industry. The committee's findings and recommendations and the results of the deliberation of the committee's three panels, a special report on heat and power, and a report on the visit by four members of the committee to Japan are presented.

  8. [Environmental Hazards Assessment Program annual report, June 1992--June 1993]. Summer undergraduate research program: Environmental studies

    SciTech Connect (OSTI)

    McMillan, J.

    1993-12-01

    The purpose of the summer undergraduate internship program for research in environmental studies is to provide an opportunity for well-qualified students to undertake an original research project as an apprentice to an active research scientist in basic environmental research. Ten students from throughout the midwestern and eastern areas of the country were accepted into the program. These students selected projects in the areas of marine sciences, biostatistics and epidemiology, and toxicology. The research experience for all these students and their mentors was very positive. The seminars were well attended and the students showed their interest in the presentations and environmental sciences as a whole by presenting the speakers with thoughtful and intuitive questions. This report contains the research project written presentations prepared by the student interns.

  9. In Situ Remediation Integrated Program, Evaluation and assessment of containment technology

    SciTech Connect (OSTI)

    Gerber, M.A.; Fayer, M.J.

    1994-04-01

    The In Situ Remediation Integrated Program (ISRIP) was established by the US Department of Energy (DOE) to advance the state-of-the art of innovative in situ remediation technologies to the point of demonstration and to broaden the applicability of these technologies to the widely varying site remediation requirements throughout the DOE complex. This program complements similar ongoing integrated demonstration programs being conducted at several DOE sites. The ISRIP has been conducting baseline assessments on in situ technologies to support program planning. Pacific Northwest Laboratory conducted an assessment and evaluation of subsurface containment barrier technology in support of ISRIP`s Containment Technology Subprogram. This report summarizes the results of that activity and provides a recommendation for priortizing areas in which additional research and development is needed to advance the technology to the point of demonstration in support of DOE`s site restoration activities.

  10. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  11. Technical Qualification Program Self-Assessment Report - NA-SH - 2013 |

    Energy Savers [EERE]

    Department of Energy NA-SH - 2013 Technical Qualification Program Self-Assessment Report - NA-SH - 2013 DOE Federal Technical Capability Panel provides the requirements for the recruitment, deployment, development, and retention of federal personnel with demonstrated technical capability to safely accomplish the Department's missions and responsibilities. This Program applies to the National Nuclear Security Administration (NNSA) Headquarters (HQ) and Field organizations that have safety

  12. Hawaii Energy Strategy: Program guide

    SciTech Connect (OSTI)

    Not Available

    1992-09-01

    The Hawaii Energy Strategy program, or HES, is a set of seven projects which will produce an integrated energy strategy for the State of Hawaii. It will include a comprehensive energy vulnerability assessment with recommended courses of action to decrease Hawaii`s energy vulnerability and to better prepare for an effective response to any energy emergency or supply disruption. The seven projects are designed to increase understanding of Hawaii`s energy situation and to produce recommendations to achieve the State energy objectives of: Dependable, efficient, and economical state-wide energy systems capable of supporting the needs of the people, and increased energy self-sufficiency. The seven projects under the Hawaii Energy Strategy program include: Project 1: Develop Analytical Energy Forecasting Model for the State of Hawaii. Project 2: Fossil Energy Review and Analysis. Project 3: Renewable Energy Resource Assessment and Development Program. Project 4: Demand-Side Management Program. Project 5: Transportation Energy Strategy. Project 6: Energy Vulnerability Assessment Report and Contingency Planning. Project 7: Energy Strategy Integration and Evaluation System.

  13. DOE/EA-1535; Uranium Leasing Program Final Programmatic Environmental Assessment

    Office of Environmental Management (EM)

    Program Final Programmatic Environmental Assessment July 2007 Office of Legacy Management DOE/EA 1535 - Work Performed Under DOE Contract No. for the U.S. Department of Energy Office of Legacy Management. DE-AC01-02GJ79491 Approved for public release; distribution is unlimited. Office of Legacy Management Office of Legacy Management Office of Legacy Management U.S. Department of Energy DOE/EA-1535 Uranium Leasing Program Final Programmatic Environmental Assessment July 2007 U.S. Department of

  14. Panel results of the solar thermal program research requirement assessment review. Final report

    SciTech Connect (OSTI)

    1983-11-01

    The objectives of the assessment were to identify: research needs by topic and activity, relative priority of research needs, options for performing needed research, potential performers, costs and duration of R and D activities, gaps and duplications within the R and D program, and activities underway that appear to be of low priority. To achieve these objectives, research programs of the Division of Solar Thermal Technologies within the Office of Renewable Energy and Conservation and the Materials and Advanced Energy Programs of the Office of Basic Energy Sciences were reviewed. Several recent assessments of solar thermal research needs made within the past two years by various groups were also reviewed, and the key research issues and needs were extracted. The primary results from the assessment are a set of prioritized activities to meet the most important research needs for solar thermal technologies. These activities belong to four disciplines: materials science, thermal science, thermochemistry, and engineering. Further, priorities associated with the needs for research result from the various activities allow the recommended activities to be grouped into two categories; a core group which should be at the heart of any future program developed by the department, and a set of important needs that should, at least, find their way into a program at some time during its existence. The recommended research program is outlined, and the complete set of ranked research needs is listed.

  15. Independent Assessment of Technology Characterizations to Support the Biomass Program Annual State-of-Technology Assessments

    SciTech Connect (OSTI)

    Yeh, B.

    2011-03-01

    This report discusses an investigation that addressed two thermochemical conversion pathways for the production of liquid fuels and addressed the steps to the process, the technology providers, a method for determining the state of technology and a tool to continuously assess the state of technology. This report summarizes the findings of the investigation as well as recommendations for improvements for future studies.

  16. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Removing Vulnerable Civilian Nuclear and Radiological Material | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  17. Liquefied Gaseous Fuels Safety and Environmental Control Assessment Program: second status report

    SciTech Connect (OSTI)

    1980-10-01

    This document is arranged in three volumes and reports on progress in the Liquefied Gaseous Fuels (LGF) Safety and Environmental Control Assessment Program made in fiscal Year (FY)-1979 and early FY-1980. Volume 3 contains reports from 6 government contractors on LPG, anhydrous ammonia, and hydrogen energy systems. Report subjects include: simultaneous boiling and spreading of liquefied petroleum gas (LPG) on water; LPG safety research; state-of-the-art of release prevention and control technology in the LPG industry; ammonia: an introductory assessment of safety and environmental control information; ammonia as a fuel, and hydrogen safety and environmental control assessment.

  18. Strategic Environmental Research and Development Program: Atmospheric Remote Sensing and Assessment Program -- Final Report. Part 1: The lower atmosphere

    SciTech Connect (OSTI)

    Tooman, T.P.

    1997-01-01

    This report documents work done between FY91 and FY95 for the lower atmospheric portion of the joint Department of Defense (DoD) and Department of Energy (DOE) Atmospheric Remote Sensing and Assessment Program (ARSAP) within the Strategic Environmental Research and Development Program (SERDP). The work focused on (1) developing new measurement capabilities and (2) measuring atmospheric heating in a well-defined layer and then relating it to cloud properties an water vapor content. Seven new instruments were develop3ed for use with Unmanned Aerospace Vehicles (UAVs) as the host platform for flux, radiance, cloud, and water vapor measurements. Four major field campaigns were undertaken to use these new as well as existing instruments to make critically needed atmospheric measurements. Scientific results include the profiling of clear sky fluxes from near surface to 14 km and the strong indication of cloudy atmosphere absorption of solar radiation considerably greater than predicted by extant models.

  19. Review of the Los Alamos Site Office Safety System Oversight Program Self-Assessment, March 2012

    Office of Environmental Management (EM)

    Los Alamos Site Office Safety System Oversight Program Self-Assessment March 2012 Office of Safety and Emergency Management Evaluations Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose ................................................................................................................................................... 1 2.0 Background

  20. Technical Qualification Program Self-Assessment Report- Los Alamos Site Office- 2011

    Broader source: Energy.gov [DOE]

    The overall approach of the TQP self-assessment was to evaluate the personnel, procedures, and management control systems that demonstrate an effective program for ensuring the technical capability of LASO employees whose responsibilities require them to provide assistance, guidance, direction, oversight, or evaluation of contractor activities that could impact the safe operation of a defense nuclear facility.

  1. Environmental assessment for the satellite power system concept development and evaluation program: atmospheric effects

    SciTech Connect (OSTI)

    Rote, D.M.; Brubaker, K.L.; Lee, J.L.

    1980-11-01

    The US Department of Energy (DOE) has undertaken a preliminary, three-year program to investigate the impacts of the construction and operation of a satellite power system, of unprecedented scale. The Department of Energy's program, titled The Concept Development and Evaluation Program, focused its investigations on a Reference System description that calls for the use of either silicon (Si) or gallium aluminum-arsenide (GaAlAs) photovoltaic cells on 60 satellites to be constructed in GEO over a 30-yr period. Rectennas would be constructed on the ground to receive microwave energy from the satellites. Each satellite-rectenna pair is designed to produce 5 GW of power on an essentially continuous basis for use as a baseload power source for an electric power distribution system. The environmental assessment part of the program was divided into five interdependent task areas. The present document constitutes the final technical report on one of the five task areas, the Assessment of the Atmospheric Effects, and as such presents an in-depth summary of work performed during the assessment program. The issues associated with SPS activities in the troposphere are examined. These include tropospheric weather modification related to rectenna operations and rocket launches, and air quality impacts related to rocketlaunch ground clouds. Then progressing upward through the various levels of the atmosphere, the principal middle and upper atmospheric effects associated with rocket effluents are analyzed. Finally, all of the potential SPS atmospheric effects are summarized.

  2. Office of Enterprise Assessments Review of the Fire Protection Program at the Los Alamos National Laboratory, November 2014

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fire Protection Program at the Los Alamos National Laboratory November 2014 Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy Table of Contents 1.0 Purpose .................................................................................................................................................... 1 2.0 Background

  3. A Program for Risk Assessment Associated with IGSCC of BWR Vessel Internals

    SciTech Connect (OSTI)

    A. G. Ware; D. K. Morton; J. D. Page; M. E. Nitzel; S. A. Eide; T. -Y. Chang

    1999-08-01

    A program is being carried out for the US Nuclear Regulatory Commission (NRC) by the Idaho National Engineering and Environmental Laboratory (INEEL), to conduct an independent risk assessment of the consequences of failures initiated by intergranular stress corrosion cracking (IGSCC) of the reactor vessel internals of boiling water reactor (BWR) plants. The overall project objective is to assess the potential consequences and risks associated with the failure of IGSCC-susceptible BWR vessel internals, both singly and in combination with the failures of others, with specific consideration given to potential cascading and common mode effects on system performance. This paper presents a description of the overall program that is underway to modify an existing probabilistic risk assessment (PRA) of the BWR/4 plant to include IGSCC-initiated failures, subsequently to complete a quantitative PRA.

  4. Environmental Restoration Program waste minimization and pollution prevention self-assessment

    SciTech Connect (OSTI)

    Not Available

    1994-10-01

    The Environmental Restoration (ER) Program within Martin Marietta Energy Systems, Inc. is currently developing a more active waste minimization and pollution prevention program. To determine areas of programmatic improvements within the ER Waste Minimization and Pollution Prevention Awareness Program, the ER Program required an evaluation of the program across the Oak Ridge K-25 Site, the Oak Ridge National Laboratory, the Oak Ridge Y-12 Plant, the Paducah Environmental Restoration and Waste Minimization Site, and the Portsmouth Environmental Restoration and Waste Minimization Site. This document presents the status of the overall program as of fourth quarter FY 1994, presents pollution prevention cost avoidance data associated with FY 1994 activities, and identifies areas for improvement. Results of this assessment indicate that the ER Waste Minimization and Pollution Prevention Awareness Program is firmly established and is developing rapidly. Several procedural goals were met in FY 1994 and many of the sites implemented ER waste minimization options. Additional growth is needed, however, for the ER Waste Minimization and Pollution Prevention Awareness Program.

  5. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  6. V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 5: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability V-185: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability June 25, 2013 - 12:41am Addthis PROBLEM: Apache OpenOffice SDK Oracle Java JavaDoc Spoofing Vulnerability PLATFORM: Apache OpenOffice SDK 3.x ABSTRACT: Apache has acknowledged a vulnerability in Apache OpenOffice SDK REFERENCE LINKS: Apache OpenOffice Secunia Advisory SA53963 Secunia Advisory SA53846 CVE-2013-1571 IMPACT ASSESSMENT:

  7. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  8. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  9. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  10. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  11. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  12. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  13. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  14. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  15. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  16. Assessment of net lost revenue adjustment mechanisms for utility DSM programs

    SciTech Connect (OSTI)

    Baxter, L.W.

    1995-01-01

    Utility shareholders can lose money on demand-side management (DSM) investments between rate cases. Several industry analysts argue that the revenues lost from utility DSM programs are an important financial disincentive to utility DSM investment. A key utility regulatory reform undertaken since 1989 allows utilities to recover the lost revenues incurred through successful operation of DSM programs. Explicitly defined net lost revenue adjustment (NLRA) mechanisms are states` preferred approach to lost revenue recovery from DSM programs. This report examines the experiences states and utilities are having with the NLRA approach. The report has three objectives. First, we determine whether NLRA is a feasible and successful approach to removing the lost-revenue disincentive to utility operation of DSM programs. Second, we identify the conditions linked to successful implementation of NLRA mechanisms in different states and assess whether NLRA has changed utility investment behavior. Third, we suggest improvements to NLRA mechanisms. We first identify states with NLRA mechanisms where utilities are recovering lost revenues from DSM programs. We interview staff at regulatory agencies in all these states and utility staff in four states. These interviews focus on the status of NLRA, implementation issues, DSM measurement issues, and NLRA results. We also analyze regulatory agency orders on NLRA, as well as associated testimony, reports, and utility lost revenue recovery filings. Finally, we use qualitative and quantitative indicators to assess NLRA`s effectiveness. Contrary to the concerns raised by some industry analysts, our results indicate NLRA is a feasible approach to the lost-revenue disincentive.

  17. Pollution prevention opportunity assessment for Sandia National Laboratories/California recycling programs.

    SciTech Connect (OSTI)

    Wrons, Ralph Jordan; Vetter, Douglas Walter

    2007-07-01

    This Pollution Prevention Opportunity Assessment (PPOA) was conducted for the Sandia National Laboratories/California (SNL/CA) Environmental Management Department between May 2006 and March 2007, to evaluate the current site-wide recycling program for potential opportunities to improve the efficiency of the program. This report contains a summary of the information collected and analyses performed with recommended options for implementation. The SNL/NM Pollution Prevention (P2) staff worked with the SNL/CA P2 Staff to arrive at these options.

  18. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  19. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  20. Los Alamos Site Office Nuclear Maintenance Management Program Oversight Self-Assessment, April 2011

    Office of Environmental Management (EM)

    Report Number: HIAR-LANL-2011-11-18 Site: Los Alamos National Laboratory Subject: Office of Enforcement and Oversight's Office of Safety and Emergency Management Evaluations Activity Report for the Los Alamos Site Office Nuclear Maintenance Management Program Oversight Self-Assessment Dates of Activity : 11/14/2011 - 11/18/2011 Report Preparer: Tim Martin Activity Description/Purpose: This activity report documents the results of the U.S. Department of Energy (DOE) Office of Health, Safety and

  1. DOE-STD-1158-2002; Self-Assessment Standard for DOE Contractor Criticality Safety Programs

    Office of Environmental Management (EM)

    02 November 2002 DOE STANDARD SELF-ASSESSMENT STANDARD FOR DOE CONTRACTOR CRITICALITY SAFETY PROGRAMS U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE This document has been reproduced from the best available copy. Available to DOE and DOE contractors from ES&H Technical Information Services, U.S. Department of Energy, (800) 473-4375, fax: (301) 903-9823. Available to the

  2. Waste isolation safety assessment program. Task 4. Third contractor information meeting

    SciTech Connect (OSTI)

    Not Available

    1980-06-01

    The Contractor Information Meeting (October 14 to 17, 1979) was part of the FY-1979 effort of Task 4 of the Waste Isolation Safety Assessment Program (WISAP): Sorption/Desorption Analysis. The objectives of this task are to: evaluate sorption/desorption measurement methods and develop a standardized measurement procedure; produce a generic data bank of nuclide-geologic interactions using a wide variety of geologic media and groundwaters; perform statistical analysis and synthesis of these data; perform validation studies to compare short-term laboratory studies to long-term in situ behavior; develop a fundamental understanding of sorption/desorption processes; produce x-ray and gamma-emitting isotopes suitable for the study of actinides at tracer concentrations; disseminate resulting information to the international technical community; and provide input data support for repository safety assessment. Conference participants included those subcontracted to WISAP Task 4, representatives and independent subcontractors to the Office of Nuclear Waste Isolation, representatives from other waste disposal programs, and experts in the area of waste/geologic media interaction. Since the meeting, WISAP has been divided into two programs: Assessment of Effectiveness of Geologic Isolation Systems (AEGIS) (modeling efforts) and Waste/Rock Interactions Technology (WRIT) (experimental work). The WRIT program encompasses the work conducted under Task 4. This report contains the information presented at the Task 4, Third Contractor Information Meeting. Technical Reports from the subcontractors, as well as Pacific Northwest Laboratory (PNL), are provided along with transcripts of the question-and-answer sessions. The agenda and abstracts of the presentations are also included. Appendix A is a list of the participants. Appendix B gives an overview of the WRIT program and details the WRIT work breakdown structure for 1980.

  3. Liquefied gaseous fuels safety and environmental control assessment program: third status report

    SciTech Connect (OSTI)

    Not Available

    1982-03-01

    This Status Report contains contributions from all contractors currently participating in the DOE Liquefied Gaseous Fuels (LG) Safety and Environmental Control Assessment Program and is presented in two principal sections. Section I is an Executive Summary of work done by all program participants. Section II is a presentation of fourteen individual reports (A through N) on specific LGF Program activities. The emphasis of Section II is on research conducted by Lawrence Livermore National Laboratory (Reports A through M). Report N, an annotated bibliography of literature related to LNG safety and environmental control, was prepared by Pacific Northwest Laboratory (PNL) as part of its LGF Safety Studies Project. Other organizations who contributed to this Status Report are Aerojet Energy Conversion Company; Applied Technology Corporation; Arthur D. Little, Incorporated; C/sub v/ International, Incorporated; Institute of Gas Technology; and Massachusetts Institute of Technology. Separate abstracts have been prepared for Reports A through N for inclusion in the Energy Data Base.

  4. Structural aging program to assess the adequacy of critical concrete components in nuclear power plants

    SciTech Connect (OSTI)

    Naus, D.J.; Marchbanks, M.F.; Oland, C.B.; Arndt, E.G.

    1989-01-01

    The Structural Aging (SAG) Program is carried out by the Oak Ridge National Laboratory (ORNL) under sponsorship of the United States Nuclear Regulatory Commission (USNRC). The Program has evolved from preliminary studies conducted to evaluate the long-term environmental challenges to light-water reactor safety-related concrete civil structures. An important conclusion of these studies was that a damage methodology, which can provide a quantitative measure of a concrete structure's durability with respect to potential future requirements, needs to be developed. Under the SAG Program, this issue is being addressed through: establishment of a structural materials information center, evaluation of structural component assessment and repair technologies, and development of a quantitative methodology for structural aging determinations. Progress to date of each of these activities is presented as well as future plans. 7 refs., 5 figs.

  5. Seismic assessment of buried pipelines

    SciTech Connect (OSTI)

    Al-Chaar, G.; Brady, P.; Fernandez, G.

    1995-12-31

    A structure and its lifelines are closely linked because the disruption of lifeline systems will obstruct emergency service functions that are vitally needed after an earthquake. As an example of the criticality of these systems, the Association of Bay Area Government (ABAG) recorded thousands of leaks in pipelines that resulted in more than twenty million gallons of hazardous materials being released in several recorded earthquakes. The cost of cleaning the spills from these materials was very high. This information supports the development of seismic protection of lifeline systems. The US Army Corps of Engineers Construction Engineering Research Laboratories (USACERL) has, among its missions, the responsibility to develop seismic vulnerability assessment procedures for military installations. Within this mission, a preliminary research program to assess the seismic vulnerability of buried pipeline systems on military installations was initiated. Phase 1 of this research project resulted in two major studies. In the first, evaluating current procedures to seismically design or evaluate existing lifeline systems, the authors found several significant aspects that deserve special consideration and need to be addressed in future research. The second was focused on identifying parameters related to buried pipeline system vulnerability and developing a generalized analytical method to relate these parameters to the seismic vulnerability assessment of existing pipeline systems.

  6. Preliminary Assessment of the Hanford Tank Waste Feed Acceptance and Product Qualification Programs

    SciTech Connect (OSTI)

    Herman, C. C.; Adamson, Duane J.; Herman, D. T.; Peeler, David K.; Poirier, Micheal R.; Reboul, S. H.; Stone, M. E.; Peterson, Reid A.; Chun, Jaehun; Fort, James A.; Vienna, John D.; Wells, Beric E.

    2013-04-01

    The U.S. Department of Energy Office of Environmental Management (EM) is engaging the national laboratories to provide the scientific and technological rigor to support EM program and project planning, technology development and deployment, project execution, and assessment of program outcomes. As an early demonstration of this new responsibility, Savannah River National Laboratory (SRNL) and Pacific Northwest National Laboratory (PNNL) have been chartered to implement a science and technology program addressing Hanford Tank waste feed acceptance and product qualification. As a first step, the laboratories examined the technical risks and uncertainties associated with the planned waste feed acceptance and qualification testing for Hanford tank wastes. Science and technology gaps were identified for work associated with 1) feed criteria development with emphasis on identifying the feed properties and the process requirements, 2) the Tank Waste Treatment and Immobilization Plant (WTP) process qualification program, and 3) the WTP HLW glass product qualification program. Opportunities for streamlining the accetpance and qualification programs were also considered in the gap assessment. Technical approaches to address the science and technology gaps and/or implement the opportunities were identified. These approaches will be further refined and developed as strong integrated teams of researchers from national laboratories, contractors, industry, and academia are brought together to provide the best science and technology solutions. Pursuing the identified approaches will have immediate and long-term benefits to DOE in reducing risks and uncertainties associated with tank waste removal and preparation, transfers from the tank farm to the WTP, processing within the WTP Pretreatment Facility, and in producing qualified HLW glass products. Additionally, implementation of the identified opportunities provides the potential for long-term cost savings given the anticipated facility life of WTP.

  7. Application of EPA wetland research program approach to a floodplain wetland restoration assessment.

    SciTech Connect (OSTI)

    Kolka, R., K.; Trettin, C., C.; Nelson, E., A.; Barton, C., D.; Fletcher, D., E.

    2002-01-01

    Kolka, R.K., C.C. Trettin, E.A. Nelson, C.D. Barton, and D.E. Fletcher. 2002. Application of the EPA Wetland Research Program Approach to a floodplain wetland restoration assessment. J. Env. Monitoring & Restoration 1(1):37-51. Forested wetland restoration assessment is difficult because of the timeframe necessary for the development of a forest ecosystem. The development of a forested wetland ecosystem includes the recovery of hydrology, soils, vegetation, and faunal communities. To assess forested wetland restoration projects, measures need to be developed that are sensitive to early changes in community development and are predictive of future conditions. In this study we apply the EPS's Wetland Research Program's (WRP) approach to assess the recovery of two thermally altered riparian wetland systems in South Carolina. In one of the altered wetland systems, approximately 75% of the wetland was planted with bottomland tree seedlings in an effort to hasten recovery. Individual studies addressing hydrology, soils, vegetation, and faunal communities indicate variable recovery responses.

  8. Enterprise Assessments Lessons Learned from Targeted Reviews of Fire Protection Programs at Department of Energy Facilities … August 2015

    Broader source: Energy.gov (indexed) [DOE]

    Lessons Learned from Targeted Reviews of Fire Protection Programs at Department of Energy Nuclear Facilities August 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  9. Enterprise Assessments Targeted Review of the Paducah Depleted Uranium Hexafluoride Conversion Facility Fire Protection Program … September 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Targeted Review of the Paducah Depleted Uranium Hexafluoride Conversion Facility Fire Protection Program September 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ..................................................................................................................................................... ii Executive Summary

  10. Enterprise Assessments Review of the Sandia National Laboratories / New Mexico Emergency Management Exercise Program … November 2015

    Office of Environmental Management (EM)

    Sandia National Laboratories/New Mexico Emergency Management Exercise Program November 2015 Office of Emergency Management Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  11. Hawaii energy strategy project 3: Renewable energy resource assessment and development program

    SciTech Connect (OSTI)

    1995-11-01

    RLA Consulting (RLA) has been retained by the State of Hawaii Department of Business, Economic Development and Tourism (DBEDT) to conduct a Renewable Energy Resource Assessment and Development Program. This three-phase program is part of the Hawaii Energy Strategy (HES), which is a multi-faceted program intended to produce an integrated energy strategy for the State of Hawaii. The purpose of Phase 1 of the project, Development of a Renewable Energy Resource Assessment Plan, is to better define the most promising potential renewable energy projects and to establish the most suitable locations for project development in the state. In order to accomplish this goal, RLA has identified constraints and requirements for renewable energy projects from six different renewable energy resources: wind, solar, biomass, hydro, wave, and ocean thermal. These criteria were applied to areas with sufficient resource for commercial development and the results of Phase 1 are lists of projects with the most promising development potential for each of the technologies under consideration. Consideration of geothermal energy was added to this investigation under a separate contract with DBEDT. In addition to the project lists, a monitoring plan was developed with recommended locations and a data collection methodology for obtaining additional wind and solar data. This report summarizes the results of Phase 1. 11 figs., 22 tabs.

  12. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  13. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  14. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  15. U.S. Postal Service radon assessment and mitigation program. Progress report, September 1993--November 1994

    SciTech Connect (OSTI)

    Velazquez, L.E.; Petty, J.L. Jr.

    1994-12-31

    In 1992, the US Postal Service (USPS) entered into an Interagency Agreement with the Department of Energy (DOE) whereby DOE would provide technical assistance in support of the USPS Radon Assessment and Mitigation Program. To aid in this effort, DOE tasked the Hazardous Waste Remedial Actions Program (HAZWRAP), which is managed by Martin Marietta Energy Systems, Inc., for DOE under contract AC05-84OR21400. Since that time, HAZWRAP has developed and finalized the sampling protocol, mitigation diagnostic protocol, and the quality assurance and quality control procedures. These procedures were validated during the Protocol Validation (1992-1993) and Pilot Study (1993-1994) phases of the program. To date, HAZWRAP has performed approximately 16,000 radon measurements in 250 USPS buildings. Mitigation diagnostics have been performed in 27 buildings. Thus far, 13% of the measurements have been above the Environmental Protection Agency action level of 4 pCi/L. This report summarizes the pilot program radon testing data and mitigation diagnostic data for 22 sites and contains recommendations for mitigation diagnostics.

  16. Department of Energy Small-Scale Hydropower Program: Feasibility assessment and technology development summary report

    SciTech Connect (OSTI)

    Rinehart, B.N.

    1991-06-01

    This report summarizes two subprograms under the US Department of Energy's Small-Scale Hydroelectric Power Program. These subprograms were part of the financial assistance activities and included the Program Research and Development Announcement (PRDA) feasibility assessments and the technology development projects. The other major subprograms included engineering research and development, legal and institutional aspects, and technology transfer. These other subprograms are covered in their respective summary reports. The problems of energy availability and increasing costs of energy led to a national effort to develop economical and environmental attractive alternative energy resources. One such alternative involved the utilization of existing dams with hydraulic heads of <65 ft and the capacity to generate hydroelectric power of 15 MW or less. Thus, the PRDA program was initiated along with the Technology Development program. The purpose of the PRDA feasibility studies was to encourage development of renewable hydroelectric resources by providing engineering, economic, environmental, safety, and institutional information. Fifty-five feasibility studies were completed under the PRDA. This report briefly summarizes each of those projects. Many of the PRDA projects went on to become technology development projects. 56 refs., 1 fig., 2 tabs.

  17. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  18. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  19. U-198: IBM Lotus Expeditor Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system..

  20. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  1. Visualization & Controls Program Peer Review | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Visualization & Controls Program Peer Review Visualization & Controls Program Peer Review With mounting evidence suggesting an increased probability that malicious attacks may be launched against energy control systems, there is a critical need to understand specific cyber vulnerabilities and corresponding mitigation strategies. This need is being addressed by SCADA/ Energy Management System (EMS) Cyber Security Assessments conducted at the National SCADA Test Bed (NSTB) facility at INL

  2. Preliminary assessment report for Camp Swift Military Reservation, Installation 48070, Bastrop County, Texas. Installation Restoration Program

    SciTech Connect (OSTI)

    Dennis, C.B.

    1993-08-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Texas Army National Guard property in Bastrop County, Texas. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Camp Swift property, the requirement of the Department of Defense Installation Restoration Program (IRP). The review of both historical and current practices at the property indicated that the activities at Camp Swift include no operations considered to have an adverse impact to the environment. The recommendation, therefore, is that no further IRP action is necessary at this property.

  3. Preliminary assessment report for Waiawa Gulch, Installation 15080, Pearl City, Oahu, Hawaii. Installation Restoration Program

    SciTech Connect (OSTI)

    Not Available

    1993-08-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Hawaii Army National Guard (HIARNG) property near Pearl City, Oahu, Hawaii. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Waiawa Gulch property, phase I of the Department of Defense Installation Restoration Program (IRP).

  4. Satellite power system concept development and evaluation program system definition technical assessment report

    SciTech Connect (OSTI)

    Not Available

    1980-12-01

    The results of the system definition studies conducted by NASA as a part of the Department of Energy/National Aeronautics and Space Administration SPS Concept Development and Evaluation Program are summarized. The purpose of the system definition efforts was to identify and define candidate SPS concepts and to evaluate the concepts in terms of technical and cost factors. Although the system definition efforts consisted primarily of evaluation and assessment of alternative technical approaches, a reference system was also defined to facilitate economic, environmental, and societal assessments by the Department of Energy. This reference system was designed to deliver 5 GW of electrical power to the utility grid. Topics covered include system definition; energy conversion and power management; power transmission and reception; structures, controls, and materials; construction and operations; and space transportation.

  5. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, P.D.

    1998-01-01

    This Quality Assessment Program (QAP) is designed to test the quality of the environmental measurements being reported to the Department of Energy by its contractors. Since 1976, real or synthetic environmental samples that have been prepared and thoroughly analyzed at the Environmental Measurements Laboratory (EML) have been distributed at first quarterly and then semi-annually to these contractors. Their results, which are returned to EML within 90 days, are compiled with EML`s results and are reported back to the participating contractors 30 days later. A summary of the reported results is available to the participants 4 days after the reporting deadline via the Internet at www.eml.doe.gov. This report presents the results from the analysis of the 47th set of environmental quality assessment samples (QAP XLVII) that were received on or before December 1, 1997.

  6. Preliminary assessment report for Fort Jacob F. Wolters, Installation 48555, Mineral Wells, Texas. Installation Restoration Program

    SciTech Connect (OSTI)

    Dennis, C.B.

    1993-08-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Texas Army National Guard (TXARNG) property near Mineral Wells, Texas. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Fort Wolters property, the requirement of the Department of Defense Installation Restoration Program.

  7. Preliminary assessment report for Fort Custer Training Center, Installation 26035, Augusta, Michigan. Installation Restoration Program

    SciTech Connect (OSTI)

    Flaim, S.; Krokosz, M.

    1993-08-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Michigan Army National Guard property near Augusta, Michigan. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Fort Custer Training Center, phase I of the Department of Defense Installation Restoration Program. The environmentally significant operations associated with the property are (1) storage of hazardous materials and hazardous waste, (2) storage and dispensing of fuel, (3) washing of vehicles and equipment, and (4) weapons training ranges that may have accumulated lead.

  8. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  9. Pacific Northwest National Laboratory FY96 evaluation of Integrated Assessment Program

    SciTech Connect (OSTI)

    1996-10-01

    The Pacific Northwest National Laboratory`s Integrated Assessment Program (IAP) is the primary system to assess and monitor overall performance and to drive continuous improvement in the Laboratory. The approach used is a significant departure from the Laboratory`s traditional reliance on auditing methods. It is a move toward the contemporary concepts of measuring organizational performance by encouraging scientific, operational, and business excellence, through self-assessment and strengthening line management accountability for results in product and service quality, safety, and cost. This report describes the approach used (methods and processes), the deployment of that approach in the six Laboratory organizations selected to pilot the approach, and a summary of how the pilot organizations used the results they obtained. Section 3.0 of this report summarizes the top strengths and weaknesses in performance as identified by Division/Directorate self-assessments, Independent Oversight, Internal Audit and peer reviews, and includes the actions that have been, or will be taken, to improve performance in areas that are weak.

  10. Energy Assessments under the Top 10,000 Program - A Case Study for a Steel Mill in China

    SciTech Connect (OSTI)

    Lu, Hongyou; Price, Lynn; Nimbalkar, Sachin U; Thekdi, Arvind; Degroot, Matthew; Shi, Jun

    2014-01-01

    One of the largest energy-savings programs for the Chinese industrial sector was the Top-1,000 Program, which targeted the 1,000 largest industrial enterprises in China. This program was launched in 2006, implemented through 2010, and covered 33% of national energy usage. Because of the success of the Top-1000 initiative, the program has now been expanded to the Top-10,000 program in the 12th Five-Year Plan period (2011-2015). The Top-10,000 program covers roughly 15,000 industrial enterprises, or about two-thirds of China s total energy consumption. Implementing energy audit systems and conducting industrial energy efficiency assessments are key requirements of the Top-10,000 program. Previous research done by Lawrence Berkeley National Laboratory (LBNL) has shown that there is a significant potential for improvement in energy assessment practices and applications in China. Issues such as lack of long term policy mechanisms, insufficient motivation for industrial enterprises, limited technical scope of energy assessments, and lack of systematic standardization have been identified. Through the support of the U.S. Department of Energy (DOE) and the U.S. State Department (with additional co-funding from the Energy Foundation China), LBNL, Oak Ridge National Laboratory, the Institute for Sustainable Communities (ISC), and DOE Energy Experts worked collaboratively with Chinese local organizations and conducted a series of industrial energy efficiency assessment demonstrations in selected Chinese industrial plants. The project aimed to not only introduce standardized methodologies and tools for energy assessments, but also to bring the systems approach for energy system analysis to the Top 10,000 enterprises. Through the project, five energy system assessments were conducted, and more than 300 Chinese experts from local energy conservation centers, universities, research organizations, energy service companies, and plant engineers were trained. This paper begins by introducing China s national energy intensity and carbon intensity reduction targets. Then, this paper explains the development of Top 10,000 program, including program requirements, the method for target allocation, key supporting policies, as well as challenges in implementing the program. By focusing on a process heating energy system assessment conducted in a Chinese steel mill, this paper presents an example of an energy system assessment conducted on steel reheating furnaces, including overall energy efficiency levels, areas of heat loss, and the potential for energy savings. In addition, the paper provides energy-savings recommendations that were identified during the assessment, as well as potential energy and energy costs savings. To conclude, this paper presents key findings that could further improve the Top 10,000 program by implementing a systems approach for energy assessments.

  11. Liquefied Gaseous Fuels Safety and Environmental Control Assessment Program: second status report

    SciTech Connect (OSTI)

    Not Available

    1980-10-01

    The Assistant Secretary for Environment has responsibility for identifying, characterizing, and ameliorating the environmental, health, and safety issues and public concerns associated with commercial operation of specific energy systems. The need for developing a safety and environmental control assessment for liquefied gaseous fuels was identified by the Environmental and Safety Engineering Division as a result of discussions with various governmental, industry, and academic persons having expertise with respect to the particular materials involved: liquefied natural gas, liquefied petroleum gas, hydrogen, and anhydrous ammonia. This document is arranged in three volumes and reports on progress in the Liquefied Gaseous Fuels (LGF) Safety and Environmental Control Assessment Program made in Fiscal Year (FY)-1979 and early FY-1980. Volume 1 (Executive Summary) describes the background, purpose and organization of the LGF Program and contains summaries of the 25 reports presented in Volumes 2 and 3. Annotated bibliographies on Liquefied Natural Gas (LNG) Safety and Environmental Control Research and on Fire Safety and Hazards of Liquefied Petroleum Gas (LPG) are included in Volume 1.

  12. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  13. Annual Stock Assessment - CWT [Coded Wire Tag program] (USFWS), Annual Report 2007.

    SciTech Connect (OSTI)

    Pastor, Stephen M.

    2009-07-21

    In 1989 the Bonneville Power Administration (BPA) began funding the evaluation of production groups of juvenile anadromous fish not being coded-wire tagged for other programs. These groups were the 'Missing Production Groups'. Production fish released by the U.S. Fish and Wildlife Service (FWS) without representative coded-wire tags during the 1980s are indicated as blank spaces on the survival graphs in this report. This program is now referred to as 'Annual Stock Assessment - CWT'. The objectives of the 'Annual Stock Assessment' program are to: (1) estimate the total survival of each production group, (2) estimate the contribution of each production group to fisheries, and (3) prepare an annual report for USFWS hatcheries in the Columbia River basin. Coded-wire tag recovery information will be used to evaluate the relative success of individual brood stocks. This information can also be used by salmon harvest managers to develop plans to allow the harvest of excess hatchery fish while protecting threatened, endangered, or other stocks of concern. All fish release information, including marked/unmarked ratios, is reported to the Pacific States Marine Fisheries Commission (PSMFC). Fish recovered in the various fisheries or at the hatcheries are sampled to recover coded-wire tags. This recovery information is also reported to PSMFC. This report has been prepared annually starting with the report labeled 'Annual Report 1994'. Although the current report has the title 'Annual Report 2007', it was written in fall of 2008 using data available from RMIS that same year, and submitted as final in January 2009. The main objective of the report is to evaluate survival of groups which have been tagged under this ongoing project.

  14. Environmental Assessment of the US Department of Energy Electric and Hybrid Vehicle Program

    SciTech Connect (OSTI)

    Singh, M.K.; Bernard, M.J. III; Walsh, R.F

    1980-11-01

    This environmental assessment (EA) focuses on the long-term (1985-2000) impacts of the US Department of Energy (DOE) electric and hybrid vehicle (EHV) program. This program has been designed to accelerate the development of EHVs and to demonstrate their commercial feasibility as required by the Electric and Hybrid Vehicle Research, Development and Demonstration Act of 1976 (P.L. 94-413), as amended (P.L. 95-238). The overall goal of the program is the commercialization of: (1) electric vehicles (EVs) acceptable to broad segments of the personal and commercial vehicle markets, (2) hybrid vehicles (HVs) with range capabilities comparable to those of conventional vehicles (CVs), and (3) advanced EHVs completely competitive with CVs with respect to both cost and performance. Five major EHV projects have been established by DOE: market demonstration, vehicle evaluation and improvement, electric vehicle commercialization, hybrid vehicle commercialization, and advanced vehicle development. Conclusions are made as to the effects of EV and HV commercialization on the: consumption and importation of raw materials; petroleum and total energy consumption; ecosystems impact from the time of obtaining raw material through vehicle use and materials recycling; environmental impacts on air and water quality, land use, and noise; health and safety aspects; and socio-economic factors. (LCL)

  15. Wildfire ignition resistant home design(WIRHD) program: Full-scale testing and demonstration final report.

    SciTech Connect (OSTI)

    Quarles, Stephen, L.; Sindelar, Melissa

    2011-12-13

    The primary goal of the Wildfire ignition resistant home design(WIRHD) program was to develop a home evaluation tool that could assess the ignition potential of a structure subjected to wildfire exposures. This report describes the tests that were conducted, summarizes the results, and discusses the implications of these results with regard to the vulnerabilities to homes and buildings.

  16. Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume IV. Commercial potential

    SciTech Connect (OSTI)

    Not Available

    1980-06-01

    This volume of the Nonproliferation Alternative Systems Assessment Program (NASAP) report provides time and cost estimates for positioning new nuclear power systems for commercial deployment. The assessment also estimates the rates at which the new systems might penetrate the domestic market, assuming the continuing viability of the massive light-water reactor network that now exists worldwide. This assessment does not recommend specific, detailed program plans and budgets for individual systems; however, it is clear from this analysis that any of the systems investigated could be deployed if dictated by national interest.

  17. Tucannon River Spring Chinook Captive Broodstock Program Final Environmental Assessment and Finding of No Significant Impact

    SciTech Connect (OSTI)

    N /A

    2000-05-24

    Bonneville Power Administration (BPA) is proposing to fund the Tucannon River Spring Chinook Captive Broodstock Program, a small-scale production initiative designed to increase numbers of a weak but potentially recoverable population of spring chinook salmon in the Tucannon River in the State of Washington. BPA has prepared an Environmental Assessment (EA) (DOE/EA-l326) evaluating the proposed project. Based on the analysis in the EA, BPA has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement (EIS) is not required, and BPA is issuing this Finding of No Significant Impact (FONSI).

  18. Use of hazard assessments to achieve risk reduction in the USDOE Stockpile Stewardship (SS-21) Program

    SciTech Connect (OSTI)

    Fischer, S.R.; Konkel, H.; Bott, T.; Eisenhawer, S.W. [Los Alamos National Lab., NM (United States); DeYoung, L.; Hockert, J. [Odgen Environmental and Energy Services, Albuquerque, NM (United States)

    1995-07-01

    This paper summarizes the nuclear explosive hazard assessment activities performed to support US Department of Energy (DOE) Stockpile Stewardship Demonstration Project SS-21, better known as the ``Seamless Safety`` program. Past practice within the DOE Complex has dictated the use of a significant number of post-design/fabrication safety reviews to analyze the safety associated with operations on nuclear explosives and to answer safety questions. These practices have focused on reviewing-in or auditing-in safety vs incorporating safety in the design process. SS-21 was proposed by the DOE as an avenue to develop a program to ``integrate established, recognized, verifiable safety criteria into the process at the design stage rather than continuing the reliance on reviews, evaluations and audits.`` The entire Seamless Safety design and development process is verified by a concurrent hazard assessment (HA). The primary purpose of the SS-21 Demonstration Project HA was to demonstrate the feasibility of performing concurrent HAs as part of an engineering design and development effort and then to evaluate the use of the HA to provide an indication in the risk reduction or gain in safety achieved. To accomplish this objective, HAs were performed on both baseline (i.e., old) and new (i.e. SS-21) B61-0 Center Case Section disassembly processes. These HAs were used to support the identification and documentation of weapon- and process-specific hazards and safety-critical operating steps. Both HAs focused on identifying accidents that had the potential for worker injury, public health effects, facility damage, toxic gas release, and dispersal of radioactive materials. A comparison of the baseline and SS-21 process risks provided a semi-quantitative estimate of the risk reduction gained via the Seamless Safety process.

  19. Assessing the Costs and Benefits of the Superior Energy Performance Program

    SciTech Connect (OSTI)

    Therkelsen, Peter; McKane, Aimee; Sabouini, Ridah; Evans, Tracy

    2013-07-01

    Industrial companies are seeking to manage energy consumption and costs, mitigate risks associated with energy, and introduce transparency into reports of their energy performance achievements. Forty industrial facilities are participating in the U.S. DOE supported Superior Energy Performance (SEP) program in which facilities implement an energy management system based on the ISO 50001 standard, and pursue third-party verification of their energy performance improvements. SEP certification provides industrial facilities recognition for implementing a consistent, rigorous, internationally recognized business process for continually improving energy performance and achievement of established energy performance improvement targets. This paper focuses on the business value of SEP and ISO 50001, providing an assessment of the costs and benefits associated with SEP implementation at nine SEP-certified facilities across a variety of industrial sectors. These cost-benefit analyses are part of the U.S. DOE?s contribution to the Global Superior Energy Performance (GSEP) partnership, a multi-country effort to demonstrate, using facility data, that energy management system implementation enables companies to improve their energy performance with a greater return on investment than business-as-usual (BAU) activity. To examine the business value of SEP certification, interviews were conducted with SEP-certified facilities. The costs of implementing the SEP program, including internal facility staff time, are described and a marginal payback of SEP certification has been determined. Additionally, more qualitative factors with regard to the business value and challenges related to SEP and ISO 50001 implementation are summarized.

  20. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  1. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  2. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  3. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  4. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  5. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  7. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  8. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  9. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  10. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  11. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  12. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  13. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Programming Programming Compiling and linking programs on Euclid. Compiling Codes How to compile and link MPI codes on Euclid. Read More » Using the ACML Math Library How to compile and link a code with the ACML library and include the $ACML environment variable. Read More » Process Limits The hard and soft process limits are listed. Read More » Last edited: 2016-02-01 08:07:27

  14. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This page provides examples of compilation and running scripts when mixing CC++ with Fortran codes. Read More Programming Tuning Options Tips for tuning performance on the...

  15. Medical University of South Carolina Environmental Hazards Assessment Program. Deliverables: Volume 2, Annual report, July 1, 1993--June 30, 1994

    SciTech Connect (OSTI)

    Not Available

    1994-08-18

    This reference is concerned with the Crossroads of Humanity workshop which is part of the Environmental Hazards Assessment Program at the Medical University of South Carolina. This workshop was held during the months of June and July 1994. Topics discussed include: Radioactive contamination, aging, medical ethics, and environmental risk analysis.

  16. Medical University of South Carolina Environmental Hazards Assessment Program. Deliverables: Volume 3, Annual report, July 1, 1993--June 30, 1994

    SciTech Connect (OSTI)

    Not Available

    1994-08-18

    This reference is concerned with the Crossroads of Humanity workshop which is part of the Environmental Hazards Assessment Program at the Medical University of South Carolina. This workshop was held during the month of June and July 1994. Topics discussed include: Perceived Risk Advisory Committee Meeting, surveys of public opinion about hazardous and radioactive materials, genetics,antibodies, and regulatory agencies.

  17. Performance Assessment Program for the Savannah River Site Liquid Waste Facilities - 13610

    SciTech Connect (OSTI)

    Rosenberger, Kent H.

    2013-07-01

    The Liquid Waste facilities at the U.S. Department of Energy's (DOE) Savannah River Site (SRS) are operated by Liquid Waste Operations contractor Savannah River Remediation LLC (SRR). A separate Performance Assessment (PA) is prepared to support disposal operations at the Saltstone Disposal Facility and closure evaluations for the two liquid waste tank farm facilities at SRS, F-Tank Farm and H-Tank Farm. A PA provides the technical basis and results to be used in subsequent documents to demonstrate compliance with the pertinent requirements identified in operations and closure regulatory guidance. The Saltstone Disposal Facility is subject to a State of South Carolina industrial solid waste landfill permit and the tank farms are subject to a state industrial waste water permit. The three Liquid Waste facilities are also subject to a Federal Facility Agreement approved by the State, DOE and the Environmental Protection Agency (EPA). Due to the regulatory structure, a PA is a key technical document reviewed by the DOE, the State of South Carolina and the EPA. As the waste material disposed of in the Saltstone Disposal Facility and the residual material in the closed tank farms is also subject to reclassification prior to closure via a waste determination pursuant to Section 3116 of the Ronald W. Reagan National Defense Authorization Act of Fiscal Year 2005, the U.S. Nuclear Regulatory Commission (NRC) is also a reviewing agency for the PAs. Pursuant to the Act, the NRC also has a continuing role to monitor disposal actions to assess compliance with stated performance objectives. The Liquid Waste PA program at SRS represents a continual process over the life of the disposal and closure operations. When the need for a PA or PA revision is identified, the first step is to develop a conceptual model to best represent the facility conditions. The conceptual model will include physical dimensions of the closed system, both the engineered and natural system, and modeling input parameters associated with the modeled features, both initial values (at the time of facility closure) and degradation rates/values. During the development of the PA, evaluations are conducted to reflect not only the results associated with the best available information at the time but also to evaluate potential uncertainties and sensitivities associated with the modeled system. While the PA will reflect the modeled system results from the best available information, it will also identify areas for future work to reduce overall PA uncertainties moving forward. DOE requires a PA Maintenance Program such that work continues to reduce model uncertainties, thus bolstering confidence in PA results that support regulatory decisions. This maintenance work may include new Research and Development activities or modeling as informed by previous PA results and other new information that becomes available. As new information becomes available, it is evaluated against previous PAs and appropriate actions are taken to ensure continued confidence in the regulatory decisions. Therefore, the PA program is a continual process that is not just the development of a PA but seeks to incorporate new information to reduce overall model uncertainty and provide continuing confidence in regulatory decisions. (author)

  18. Assessment of financial savings from peer reviews of in-progress projects: A case study from the Department of Energy's Hydrogen Program

    SciTech Connect (OSTI)

    Agyeman, Yaw O.; Dowd, Jeff

    2008-10-01

    Results of a study to assess the financial savings to the Department of Energy’s (DOE) Hydrogen Program due to decisions made from peer reviews.

  19. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    using MPI and OpenMP on NERSC systems, the same does not always exist for other supported parallel programming models such as UPC or Chapel. At the same time, we know that these...

  20. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    provided on the Cray systems at NERSC. The Programming Environment is managed by a meta-module named similar to "PrgEnv-gnu4.6". The "gnu" indicates that it is providing the...

  1. Programming

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Programming Programming Compiling Codes There are three compiler suites available on Carver: Portland Group (PGI), Intel, and GCC. The PGI compilers are the default, to provide compatibility with other NERSC platforms. Read More » Using MKL Intel's Math Kernel Library (MKL) is a library of highly optimized, extensively threaded math routines optimized for Intel processors. Core math functions include BLAS, LAPACK, ScaLAPACK, Sparse Solvers, Fast Fourier Transforms, Vector Math, and more. It is

  2. Technical Qualification Program Self-Assessment Report- Oak Ridge Office- 2014

    Broader source: Energy.gov [DOE]

    This assessment, using criteria referred to in DOE O 426.1, Federal Technical Capability, is designed to evaluate the effectiveness of the implementation of the FTCP and the TQP at ORO. The purpose of this report is to document the results of ORO's self-assessment. The remaining sections of this report include the assessment scope and methodology, the results of the assessment, and supporting information.

  3. Fire Protection Program Assessment, Building 9116- Y12 Plant, Oak Ridge, Tennessee

    Broader source: Energy.gov [DOE]

    This assessment is intended to evaluate the fire hazards, life safety and fire protection features inherent in Building 9116.

  4. Technical Qualification Program Self-Assessment Report- Idaho Operations Office- 2011

    Broader source: Energy.gov [DOE]

    This TQP self-assessment was performed by a review team with extensive assessment experience. The assessment approach consisted of interviewing Managers, Division Directors, Team Leads, Qualifying Officials, and a representative sample of TQP participants, reviewing applicable records, reports, and IDMS documents, and observing continuing training activities.

  5. Category:Programs | Open Energy Information

    Open Energy Info (EERE)

    Energy Authority in Sri Lanka Asian Institute of Technology Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed...

  6. Economic Impacts from the Boulder County, Colorado, ClimateSmart Loan Program: Using Property-Assessed Clean Energy Financing

    SciTech Connect (OSTI)

    Goldberg, M.; Cliburn, J. K.; Coughlin, J.

    2011-04-01

    This report examines the economic impacts (including job creation) from the Boulder County, Colorado, ClimateSmart Loan Program (CSLP), an example of Property-Assessed Clean Energy (PACE) financing. The CSLP was the first test of PACE financing on a multi-jurisdictional level (involving individual cities as well as the county government). It was also the first PACE program to comprehensively address energy efficiency measures and renewable energy, and it was the first funded by a public offering of both taxable and tax-exempt bonds.

  7. Implementation of the Port Hope Area Initiative Biophysical and Socioeconomic Environmental Assessment Follow-up Programs - 13209

    SciTech Connect (OSTI)

    Baba, Nina; Friedmann, Karyn; Groulx, Charles

    2013-07-01

    The Port Hope Initiative (PHAI) involves the cleanup of historic low-level radioactive waste in various locations throughout the communities of Port Hope and Clarington, Ontario, as well as the construction of two engineered aboveground mounds for safe long-term management. The PHAI is comprised of two major projects - the Port Hope Project and the Port Granby Project. An Environmental Assessment (EA) was undertaken for each project and as a result EA Follow-up Programs were developed and are being implemented addressing both biophysical and socioeconomic aspects. This paper provides insight on elements of the EA Follow-up Program development, and its implementation. (authors)

  8. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  9. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  10. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  11. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect (OSTI)

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  12. National Weatherization Assistance Program Impact Evaluation - Baseline Occupant Survey: Assessment of Client Status and Needs

    SciTech Connect (OSTI)

    Carroll, David; Berger, Jacqueline; Miller, Carolyn; Driscoll, Colleen

    2015-10-01

    This report summarizes results of a survey of recipients of services funded by the U.S. Department of Energy's Weatherization Assistance Program.

  13. Utility of Social Modeling for Proliferation Assessment - Preliminary Assessment

    SciTech Connect (OSTI)

    Coles, Garill A.; Gastelum, Zoe N.; Brothers, Alan J.; Thompson, Sandra E.

    2009-06-01

    This Preliminary Assessment draft report will present the results of a literature search and preliminary assessment of the body of research, analysis methods, models and data deemed to be relevant to the Utility of Social Modeling for Proliferation Assessment research. This report will provide: 1) a description of the problem space and the kinds of information pertinent to the problem space, 2) a discussion of key relevant or representative literature, 3) a discussion of models and modeling approaches judged to be potentially useful to the research, and 4) the next steps of this research that will be pursued based on this preliminary assessment. This draft report represents a technical deliverable for the NA-22 Simulations, Algorithms, and Modeling (SAM) program. Specifically this draft report is the Task 1 deliverable for project PL09-UtilSocial-PD06, Utility of Social Modeling for Proliferation Assessment. This project investigates non-traditional use of social and cultural information to improve nuclear proliferation assessment, including nonproliferation assessment, proliferation resistance assessments, safeguards assessments and other related studies. These assessments often use and create technical information about the States posture towards proliferation, the vulnerability of a nuclear energy system to an undesired event, and the effectiveness of safeguards. This project will find and fuse social and technical information by explicitly considering the role of cultural, social and behavioral factors relevant to proliferation. The aim of this research is to describe and demonstrate if and how social science modeling has utility in proliferation assessment.

  14. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  15. Better Buildings Neighborhood Program Multi-Family Peer Exchange Call: Moving Multi-family Buildings from Assessments to Upgrades, January 24, 2013

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    January 24, 2013 Better Buildings Neighborhood Program Multi- Family Peer Exchange Call: Moving Multi-family Buildings from Assessments to Upgrades Agenda * Call Logistics and Attendance * Discussion  Do programs have any lessons learned, success stories, or challenges with regard to moving from assessments to upgrades in multi-family buildings they would like to share?  What hurdles have people faced in moving from assessments to upgrades and what are potential solutions?  What are

  16. Fire Protection Program Assessment, Building 9203 & 9203A Complex- Y12 Plant, Oak Ridge, Tennessee

    Broader source: Energy.gov [DOE]

    This assessment is intended to evaluate the fire hazards, life safety and fire protection features inherent in the Building 9203 and 9203A complex.

  17. Characterization and assessment of novel bulk storage technologies : a study for the DOE Energy Storage Systems program.

    SciTech Connect (OSTI)

    Huff, Georgianne; Tong, Nellie; Fioravanti, Richard; Gordon, Paul; Markel, Larry; Agrawal, Poonum; Nourai, Ali

    2011-04-01

    This paper reports the results of a high-level study to assess the technological readiness and technical and economic feasibility of 17 novel bulk energy storage technologies. The novel technologies assessed were variations of either pumped storage hydropower (PSH) or compressed air energy storage (CAES). The report also identifies major technological gaps and barriers to the commercialization of each technology. Recommendations as to where future R&D efforts for the various technologies are also provided based on each technology's technological readiness and the expected time to commercialization (short, medium, or long term). The U.S. Department of Energy (DOE) commissioned this assessment of novel concepts in large-scale energy storage to aid in future program planning of its Energy Storage Program. The intent of the study is to determine if any new but still unproven bulk energy storage concepts merit government support to investigate their technical and economic feasibility or to speed their commercialization. The study focuses on compressed air energy storage (CAES) and pumped storage hydropower (PSH). It identifies relevant applications for bulk storage, defines the associated technical requirements, characterizes and assesses the feasibility of the proposed new concepts to address these requirements, identifies gaps and barriers, and recommends the type of government support and research and development (R&D) needed to accelerate the commercialization of these technologies.

  18. Enterprise Assessments Targeted Review of the Fire Protection Program at the Oak Ridge National Laboratory Irradiated Fuels Examination Laboratory, Building 3525 … September 2015

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Targeted Review of the Fire Protection Program at the Oak Ridge National Laboratory Irradiated Fuels Examination Laboratory, Building 3525 September 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms.................................................................................................................ii Executive

  19. Enterprise Assessments Targeted Review of the Fire Protection Program at Y-12 National Security Complex and Pantex Plant … October 2015

    Office of Environmental Management (EM)

    Targeted Review of the Fire Protection Program at Y-12 National Security Complex and Pantex Plant October 2015 Office of Nuclear Safety and Environmental Assessments Office of Environment, Safety and Health Assessments Office of Enterprise Assessments U.S. Department of Energy i Table of Contents Acronyms ...................................................................................................................................................... ii Executive Summary

  20. Program

    Office of Scientific and Technical Information (OSTI)

    Extremophiles 2004 5th International Conference on Extremophiles SEPTEMBER 19 -23, 2004 CAMBRIDGE, MARYLAND Extremophiles 2004 5th International Conference on Extremophiles © 2004, American Society for Microbiology 1752 N Street, N.W. Washington, DC 20036-2904 Phone: 202-737-3600 World Wide Web: www.asm.org All Rights Reserved Printed in the United States of America ISBN: 1-55581 324-0 TABLE OF CONTENTS General Information Scientific Program Abstracts for Oral Sessions Abstracts for Poster

  1. EPA`s program for risk assessment guidelines: Cancer classification issues

    SciTech Connect (OSTI)

    Wiltse, J.

    1990-12-31

    Issues presented are related to classification of weight of evidence in cancer risk assessments. The focus in this paper is on lines of evidence used in constructing a conclusion about potential human carcinogenicity. The paper also discusses issues that are mistakenly addressed as classification issues but are really part of the risk assessment process. 2 figs.

  2. Technical Qualification Program Self-Assessment Report- Idaho Operations Office- 2014

    Broader source: Energy.gov [DOE]

    This TQP self-assessment was performed by a review team with extensive assessment experience. The team lead has participated on past TQP Accreditation reviews and team members are currently qualified in diverse TQP functional areas. The TQP records coordinator assisted on the review team.

  3. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  4. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  5. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  6. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  7. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  8. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  9. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 15, 2012 - 7:00am Addthis PROBLEM: Sympa Multiple Security Bypass Vulnerabilities PLATFORM: Sympa in versions prior to 6.1.11 ABSTRACT: Multiple vulnerabilities have been...

  10. Regional Climate Vulnerabilities and Resilience Solutions | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser.

  11. Technical Qualification Program Self-Assessment Report- Livermore Field Office- 2013

    Broader source: Energy.gov [DOE]

    The purpose of the Livermore Field Office (LFO) Teclmical Qualification Program (TQP) is to ensure that federal teclmical personnel with safety oversight responsibilities at defense nuclear facilities at Lawrence Livermore National Laboratory possess competence commensurate with responsibilities.

  12. Technical Qualification Program Self-Assessment Report- Y-12 Site Office- 2010

    Office of Energy Efficiency and Renewable Energy (EERE)

    The National Nuclear Security Administration Y-12 Site Office (YSO) has successfully implemented a Technical Qualification Program (YSO TQP) that produces highly qualified, technical individuals to execute oversight of site activities and support the site missions.

  13. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considered subject to demand concerns, supply concerns, or both demand and supply concerns.

  14. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  15. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. PDF icon Vulnerability Analysis of Energy Delivery Control Systems (September 2011) More

  16. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  17. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  18. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  19. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  20. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  1. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  2. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  3. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  4. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks.

  5. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  6. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  7. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  8. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, Pamela D.

    1999-12-31

    This report presents the results from the analysis of the 51st set of environmental quality assessment samples (QAP-LI) that were received on or before December 2, 1999.

  9. Semi-annual report of the Department of Energy, Office of Environmental Management, Quality Assessment Program

    SciTech Connect (OSTI)

    Greenlaw, Pamela D.; Berne, Anna

    2000-06-30

    This report presents the results from the analysis of the 52nd set of environmental quality assessment samples (QAP-LII) that were received on or before June 3, 2000.

  10. Enhanced Geothermal Systems (EGS) R&D Program: US Geothermal Resources Review and Needs Assessment

    SciTech Connect (OSTI)

    Entingh, Dan; McLarty, Lynn

    2000-11-30

    The purpose of this report is to lay the groundwork for an emerging process to assess U.S. geothermal resources that might be suitable for development as Enhanced Geothermal Systems (EGS). Interviews of leading geothermists indicate that doing that will be intertwined with updating assessments of U.S. higher-quality hydrothermal resources and reviewing methods for discovering ''hidden'' hydrothermal and EGS resources. The report reviews the history and status of assessment of high-temperature geothermal resources in the United States. Hydrothermal, Enhanced, and Hot Dry Rock resources are addressed. Geopressured geothermal resources are not. There are three main uses of geothermal resource assessments: (1) They inform industry and other interest parties of reasonable estimates of the amounts and likely locations of known and prospective geothermal resources. This provides a basis for private-sector decisions whether or not to enter the geothermal energy business at all, and for where to look for useful resources. (2) They inform government agencies (Federal, State, local) of the same kinds of information. This can inform strategic decisions, such as whether to continue to invest in creating and stimulating a geothermal industry--e.g., through research or financial incentives. And it informs certain agencies, e.g., Department of Interior, about what kinds of tactical operations might be required to support such activities as exploration and leasing. (3) They help the experts who are performing the assessment(s) to clarify their procedures and data, and in turn, provide the other two kinds of users with a more accurate interpretation of what the resulting estimates mean. The process of conducting this assessment brings a spotlight to bear on what has been accomplished in the domain of detecting and understanding reservoirs, in the period since the last major assessment was conducted.

  11. A Climate Change Vulnerability Assessment Report for the National...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... This robust, recurring pattern of ocean-atmosphere climate variability is centered over the midlatitude Pacific basin. * The Atlantic Multidecadal Oscillation. This ocean current ...

  12. EXPERT PANEL OVERSIGHT COMMITTEE ASSESSMENT OF FY2008 CORROSION AND STRESS CORROSION CRACKING SIMULANT TESTING PROGRAM

    SciTech Connect (OSTI)

    BOOMER KD

    2009-01-08

    The Expert Panel Oversight Committee (EPOC) has been overseeing the implementation of selected parts of Recommendation III of the final report, Expert Panel workshop for Hanford Site Double-Shell Tank Waste Chemistry Optimization, RPP-RPT-22126. Recommendation III provided four specific requirements necessary for Panel approval of a proposal to revise the chemistry control limits for the Double-Shell Tanks (DSTs). One of the more significant requirements was successful performance of an accelerated stress corrosion cracking (SCC) experimental program. This testing program has evaluated the optimization of the chemistry controls to prevent corrosion in the interstitial liquid and supernatant regions of the DSTs.

  13. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  14. Information resources for assessing health effects from chemical exposure: Office of pesticides programs

    SciTech Connect (OSTI)

    Fenner-Crisp, P.

    1990-12-31

    The US Environmental Protection Agency (EPA) Office of Pesticide Programs is trying to develop a complete picture of a chemical`s toxicity and exposure profile. It is also important to share information in the office`s files because of pesticides, particularly as a consequence of agricultural use, find their way into places not necessarily intended.

  15. Assessment of Weatherization Assistance Program Needs for Improved Residential Measure Selection Techniques

    SciTech Connect (OSTI)

    Gettings, M.B.

    1991-01-01

    This report documents a study conducted by the Oak Ridge National Laboratory (ORNL) to evaluate the current measure selection techniques and needs of agencies within the Weatherization Assistance Program (WAP). The study precedes initiation of a project to revise and upgrade the current means of selecting energy conservation measures for low-income single- and multi-family housing and includes recommendations for the revision. Issues relevant to the formation of the revised audit procedures are discussed. Currently available audits are reviewed. No single- to multi-family audit program was found capable of fulfilling the currents needs of the WAP. Recommendations include the separate development of single- and multi-family audits. Addition of specific features to the single-family audit is recommended, including (1) measure ranking unique to each eligible house, (2) heating and cooling equipment measures, (3) cooling envelope measures, (4) means of determining the amount of infiltration work to be performed, (5) potential for customizing and simplifying to meet local needs, and (6) implementation on either a personal computer or as an alternate manual technique. A single-family audit development plan is proposed which includes examination of several existing programs as potential starting points. Recommendations related to the development of a WAP multi-family audit include examination of several existing private programs for possible use by state WAP agencies expressing the greatest need and further study of the DOE supported programs ASEAM and CIRA as possible starting points for a DOE procedure. Early identification of approved multi-family measures and their applicability to various building stock, equipment types, and fuels is also recommended.

  16. A multi-objective programming model for assessment the GHG emissions in MSW management

    SciTech Connect (OSTI)

    Mavrotas, George; Skoulaxinou, Sotiria; Gakis, Nikos; Katsouros, Vassilis; Georgopoulou, Elena

    2013-09-15

    Highlights: The multi-objective multi-period optimization model. The solution approach for the generation of the Pareto front with mathematical programming. The very detailed description of the model (decision variables, parameters, equations). The use of IPCC 2006 guidelines for landfill emissions (first order decay model) in the mathematical programming formulation. - Abstract: In this study a multi-objective mathematical programming model is developed for taking into account GHG emissions for Municipal Solid Waste (MSW) management. Mathematical programming models are often used for structure, design and operational optimization of various systems (energy, supply chain, processes, etc.). The last twenty years they are used all the more often in Municipal Solid Waste (MSW) management in order to provide optimal solutions with the cost objective being the usual driver of the optimization. In our work we consider the GHG emissions as an additional criterion, aiming at a multi-objective approach. The Pareto front (Cost vs. GHG emissions) of the system is generated using an appropriate multi-objective method. This information is essential to the decision maker because he can explore the trade-offs in the Pareto curve and select his most preferred among the Pareto optimal solutions. In the present work a detailed multi-objective, multi-period mathematical programming model is developed in order to describe the waste management problem. Apart from the bi-objective approach, the major innovations of the model are (1) the detailed modeling considering 34 materials and 42 technologies, (2) the detailed calculation of the energy content of the various streams based on the detailed material balances, and (3) the incorporation of the IPCC guidelines for the CH{sub 4} generated in the landfills (first order decay model). The equations of the model are described in full detail. Finally, the whole approach is illustrated with a case study referring to the application of the model in a Greek region.

  17. Environmental Assessment and Finding of No Significant Impact: Implementation of the Wetland Mitigation Bank Program at the Savannah River Site

    SciTech Connect (OSTI)

    N /A

    1999-04-28

    The Department of Energy (DOE) has prepared an environmental assessment (EA) (DOE/EA-1205) for the proposed implementation of a wetland mitigation bank program at the Savannah River Site (SRS), located near Aiken, South Carolina. Based on the analyses in the EA, DOE has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act of 1969 (NEPA). Therefore, the preparation of an environmental impact statement (EIS) is not required, and DOE is issuing this Finding of No Significant Impact (FONSI) and Floodplain Statement of Findings.

  18. Save Energy Now Assessment Helps Expand Energy Management Program at Shaw Industries

    SciTech Connect (OSTI)

    2008-07-01

    The Shaw Industries carpet manufacturing plant #20 in Dalton, Georgia, optimized boiler operation and installed waste heat exchangers on two processes in the dye house and an economizer on one boiler, for a payback of 1.7 years. These results prompted plant #4, also located in Dalton, to participate in an assessment.

  19. Technical Qualification Program Self-Assessment Report- Savannah River Operations Office- 2010

    Broader source: Energy.gov [DOE]

    A set of disciplined Criteria, Review, and Approach Documents (CRADs) were developed by the Team Leader utilizing criteria and objectives provided on the FTCP website. Specific "lines of inquiry" were tailored to the organization and assessment processes of the DOE-SR.

  20. Status of Net Metering: Assessing the Potential to Reach Program Caps

    SciTech Connect (OSTI)

    Heeter, J.; Gelman, R.; Bird, L.

    2014-09-01

    Several states are addressing the issue of net metering program caps, which limit the total amount of net metered generating capacity that can be installed in a state or utility service territory. In this analysis, we examine net metering caps to gain perspective on how long net metering will be available in various jurisdictions under current policies. We also surveyed state practices and experience to understand important policy design considerations.

  1. Status of Net Metering: Assessing the Potential to Reach Program Caps (Poster)

    SciTech Connect (OSTI)

    Heeter, J.; Bird, L.; Gelman, R.

    2014-10-01

    Several states are addressing the issue of net metering program caps, which limit the total amount of net metered generating capacity that can be installed in a state or utility service territory. In this analysis, we examine net metering caps to gain perspective on how long net metering will be available in various jurisdictions under current policies. We also surveyed state practices and experience to understand important policy design considerations.

  2. Assessing the Costs and Benefits of the Superior Energy Performance Program Presentation

    Broader source: Energy.gov [DOE]

    Nine companies certified under the U.S. Department of Energy (DOE) Superior Energy Performance® (SEP™) program have shown an average energy performance improvement of 10% in the first 18 months of implementing SEP with an average payback of 1.7 years. These findings and other results were presented at the July 2013 Summer Study on Energy Efficiency in Industry hosted by the American Council for an Energy-Efficient Economy

  3. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

    SciTech Connect (OSTI)

    Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

    2008-07-08

    The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

  4. Cyber Assessment Methods for SCADA Security | Department of Energy

    Energy Savers [EERE]

    Assessment Methods for SCADA Security Cyber Assessment Methods for SCADA Security This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure. The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure

  5. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  6. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  7. Mexico City Climate Action Program | Open Energy Information

    Open Energy Info (EERE)

    of greenhouse gas emissions, reduce the vulnerability of the city to the effects of global warming, and heighten our adaptation. To this end, the Program considers related...

  8. Vehicle Technologies Program Overview

    SciTech Connect (OSTI)

    none,

    2006-09-05

    Overview of the Vehicle Technologies Program including external assessment and market view; internal assessment, program history and progress; program justification and federal role; program vision, mission, approach, strategic goals, outputs, and outcomes; and performance goals.

  9. Assessment of Building Energy-Saving Policies and Programs in China During the 11th Five Year Plan

    SciTech Connect (OSTI)

    Zhou, Nan; Mcneil, Michael; Levine, Mark

    2011-03-01

    China's 11th Five-Year Plan (FYP) sets an ambitious target to reduce the energy intensity per unit of gross domestic product (GDP) by 20% from 2005 to 2010 (NDRC, 2006). In the building sector, the primary energy-saving target allocated during the 11 FYP period is 100 Mtce. Savings are expected to be achieved through the strengthening of enforcement of building energy efficiency codes, existing building retrofits and heat supply system reform, followed by energy management of government office buildings and large scale public buildings, adoption of renewable energy sources. To date, China has reported that it achieved the half of the 20% intensity reduction target by the end of 2008, however, little has been made clear on the status and the impact of the building programs. There has also been lack of description on methodology for calculating the savings and baseline definition, and no total savings that have been officially reported to date. This paper intends to provide both quantitative and qualitative assessment of the key policies and programs in building sector that China has instituted in its quest to fulfill the national goal. Overall, this paper concludes that the largest improvement for building energy efficiency were achieved in new buildings; the program to improve the energy management in government and large scale public buildings are in line with the target; however the progress in the area of existing building retrofits, particularly heating supply system reform lags behind the stated goal by a large amount.

  10. Assessment of Building Energy-Saving Policies and Programs in China During the 11th Five Year Plan

    SciTech Connect (OSTI)

    Zhou, Nan; McNeil, Michael; Levine, Mark

    2010-06-07

    China's 11th Five-Year Plan (FYP) sets an ambitious target to reduce the energy intensity per unit of gross domestic product (GDP) by 20% from 2005 to 2010 (NDRC, 2006). In the building sector, the primary energy-saving target allocated during the 11 FYP period is 100 Mtce. Savings are expected to be achieved through the strengthening of enforcement of building energy efficiency codes, existing building retrofits and heat supply system reform, followed by energy management of government office buildings and large scale public buildings, adoption of renewable energy sources. To date, China has reported that it achieved the half of the 20% intensity reduction target by the end of 2008, however, little has been made clear on the status and the impact of the building programs. There has also been lack of description on methodology for calculating the savings and baseline definition, and no total savings that have been officially reported to date. This paper intend to provide both quantitative and qualitative assessment of the key policies and programs in building sector that China has instituted in its quest to fulfill the national goal. Overall, this paper concludes that the largest improvement for building energy efficiency were achieved in new buildings; the program to improve the energy management in government and large scale public buildings are in line with the target; however the progress in the area of existing building retrofit particularly heat supply system reform lags the stated goal by a large amount.

  11. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  12. Ocean thermal energy conversion: environmental effects assessment program plan, 1981-85. [Monograph

    SciTech Connect (OSTI)

    Not Available

    1982-01-01

    The Ocean Thermal Energy Conversion (OTEC) Act of 1980 calls for a legal regime to encourage commercial OTEC while protecting the oceanic and coastal environments. The Act also requires a generic plan for assessing the environmental effects of OTEC development. The plan outlined in this report establishes a priority list of nine environmental effects and a research strategy for reducing uncertainties, with an emphasis on large-scale and long-term ecosystem implications and on the impacts of multiple facilities. 70 references, 4 figures, 4 tables. (DCK)

  13. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to cross-administrative boundaries, which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. Seventeen social vulnerability indicators are categorized into four dimensions. This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. This study provides a foundation for sustainable strategic planning to deal with environmental change. Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  14. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR

  15. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  16. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  17. Liquefied Gaseous Fuels Safety and Environmental Control Assessment Program: second status report

    SciTech Connect (OSTI)

    1980-10-01

    Volume 2 consists of 19 reports describing technical effort performed by Government Contractors in the area of LNG Safety and Environmental Control. Report topics are: simulation of LNG vapor spread and dispersion by finite element methods; modeling of negatively buoyant vapor cloud dispersion; effect of humidity on the energy budget of a liquefied natural gas (LNG) vapor cloud; LNG fire and explosion phenomena research evaluation; modeling of laminar flames in mixtures of vaporized liquefied natural gas (LNG) and air; chemical kinetics in LNG detonations; effects of cellular structure on the behavior of gaseous detonation waves under transient conditions; computer simulation of combustion and fluid dynamics in two and three dimensions; LNG release prevention and control; the feasibility of methods and systems for reducing LNG tanker fire hazards; safety assessment of gelled LNG; and a four band differential radiometer for monitoring LNG vapors.

  18. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  19. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  20. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  1. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  3. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  6. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  7. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  8. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  9. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy Lee ... vulnerabilities include balancing the risk of system compromise by an intruder with ...

  10. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  11. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Energy Savers [EERE]

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  12. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  13. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  14. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  15. Outlook for renewable energy technologies: Assessment of international programs and policies

    SciTech Connect (OSTI)

    Branstetter, L.J.; Vidal, R.C.; Bruch, V.L.; Zurn, R.

    1995-02-01

    The report presents an evaluation of worldwide research efforts in three specific renewable energy technologies, with a view towards future United States (US) energy security, environmental factors, and industrial competitiveness. The overall energy technology priorities of foreign governments and industry leaders, as well as the motivating factors for these priorities, are identified and evaluated from both technological and policy perspectives. The specific technologies of interest are wind, solar thermal, and solar photovoltaics (PV). These program areas, as well as the overall energy policies of Denmark, France, Germany, Italy, the United Kingdom (UK), Japan, Russia, and the European Community as a whole are described. The present and likely future picture for worldwide technological leadership in these technologies-is portrayed. The report is meant to help in forecasting challenges to US preeminence in the various technology areas, particularly over the next ten years, and to help guide US policy-makers as they try to identify specific actions which would help to retain and/or expand the US leadership position.

  16. DOE complex buried waste characterization assessment. Buried Waste Integrated Demonstration Program

    SciTech Connect (OSTI)

    Kaae, P.S.; Holter, G.M.; Garrett, S.M.K.

    1993-01-01

    The work described in this report was conducted by Pacific Northwest Laboratory to provide information to the Buried Waste Integrated Demonstration (BWID) program. The information in this report is intended to provide a complex-wide planning base for th.e BWID to ensure that BWID activities are appropriately focused to address the range of remediation problems existing across the US Department of Energy (DOE) complex. This report contains information characterizing the 2.1 million m{sup 3} of buried and stored wastes and their associated sites at six major DOE facilities. Approximately 85% of this waste is low-level waste, with about 12% TRU or TRU mixed waste; the remaining 3% is low-level mixed waste. In addition, the report describes soil contamination sites across the complex. Some of the details that would be useful in further characterizing the buried wastes and contaminated soil sites across the DOE complex are either unavailable or difficult to locate. Several options for accessing this information and/or improving the information that is available are identified in the report. This document is a companion to Technology Needs for Remediation: Hanford and Other DOE Sites, PNL-8328 (Stapp 1993).

  17. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  18. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2010-08-25

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

  19. Assessment of capital requirements for alternative fuels infrastructure under the PNGV program

    SciTech Connect (OSTI)

    Stork, K.; Singh, M.; Wang, M.; Vyas, A.

    1998-12-31

    This paper presents an assessment of the capital requirements of using six different fuels in the vehicles with tripled fuel economy (3X vehicles) that the Partnership for a new Generation of Vehicles is currently investigating. The six fuels include two petroleum-based fuels (reformulated gasoline and low-sulfur diesel) and four alternative fuels (methanol, ethanol, dimethyl ether, and hydrogen). This study develops estimates of cumulative capital needs for establishing fuels production and distribution infrastructure to accommodate 3X vehicle fuel needs. Two levels of fuel volume-70,000 barrels per day and 1.6 million barrels per day-were established for meeting 3X-vehicle fuel demand. As expected, infrastructure capital needs for the high fuel demand level are much higher than for the low fuel demand level. Between fuel production infrastructure and distribution infrastructure, capital needs for the former far exceed those for the latter. Among the four alternative fuels, hydrogen bears the largest capital needs for production and distribution infrastructure.

  20. Environmental assessment for the satellite power system concept development and evaluation program-electromagnetic systems compatibility

    SciTech Connect (OSTI)

    Davis, K A; Grant, W B; Morrison, E L; Juroshek, J R

    1981-01-01

    The EMC analysis addressed only the direct effects of electromagnetic emissions from the SPS on other technological systems. Emissions were defined quite broadly, including not only those from the microwave system, but also thermal blackbody emission and scattered sunlight from the satellite. The analysis is based on the design for an SPS as described in the Reference System Report and some quantitative conclusions, e.g., ranges from rectenna sites at which effects are expected are specific to that design. The methodology and qualitative conclusions, however, apply to an SPS concept using microwave power transmission. Quantitative conclusions have been obtained parametrically and can be adjusted as SPS designs change. The electromagnetic environment that the Reference System would produce, and in which other systems would have to function, is described. As an early part of the EMC Assessment, the problems expected for a hypothetical rectenna site, in the Mojave Desert of southern California, were analyzed in detail. This effort provided an initial quantitative indication of the scope of potential EMC problems and indicated the importance of EMC considerations in rectenna site selection. The results of this analysis are presented. The effects of SPS microwave emissions on important categories of electronic systems and equipment are summarized, with many examples of test results and demonstrated techniques for mitigation of problems encountered. SPS effects on other satellite systems are presented. Astronomical research frequently involves measurement of extremely low levels of electromagnetic radiation and is thus very susceptible to interference. The concerns of both radio astronomy with microwave emissions from SPS and optical astronomy with sunlight scattered from SPS spacecraft are discussed. Summaries of mitigation techniques, cost estimates, and conclusions are presented. (WHK)

  1. Vicinity Property Assessments at Formerly Utilized Sites Remedial Action Program Project Sites in the New York District - 13420

    SciTech Connect (OSTI)

    Ewy, Ann; Hays, David

    2013-07-01

    The Formerly Utilized Sites Remedial Action Program (FUSRAP) has addressed sites across the nation for almost 4 decades. Multiple stake holder pressures, multiple regulations, and process changes occur over such long time periods. These result in many challenges to the FUSRAP project teams. Initial FUSRAP work was not performed under Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) Records of Decision (ROD). The ROD identifies the remedy decision and ultimately the criteria to be used to release a site. Early FUSRAP projects used DOE Orders or the Uranium Mill Tailings Radiation Control Act (UMTRCA) standards. Under current RODs, regulations may differ, resulting in different cleanup criteria than that used in prior Vicinity Property (VP) remediation. The USACE, in preparation for closeout of Sites, conducts reviews to evaluate whether prior actions were sufficient to meet the cleanup criteria specified in the current ROD. On the basis of these reviews, USACE has conducted additional sampling, determined that prior actions were sufficient, or conducted additional remediation consistent with the selected remedy in the ROD. As the public pressures, regulations, and processes that the FUSRAP encounters continue to change, the program itself continues to evolve. Assessment of VPs at FUSRAP sites is a necessary step in the life cycle of our site management. (authors)

  2. Irradiation Programs and Test Plans to Assess High-Fluence Irradiation Assisted Stress Corrosion Cracking Susceptibility.

    SciTech Connect (OSTI)

    Teysseyre, Sebastien

    2015-03-01

    . Irradiation assisted stress corrosion cracking (IASCC) is a known issue in current reactors. In a 60 year lifetime, reactor core internals may experience fluence levels up to 15 dpa for boiling water reactors (BWR) and 100+ dpa for pressurized water reactors (PWR). To support a safe operation of our fleet of reactors and maintain their economic viability it is important to be able to predict any evolution of material behaviors as reactors age and therefore fluence accumulated by reactor core component increases. For PWR reactors, the difficulty to predict high fluence behavior comes from the fact that there is not a consensus of the mechanism of IASCC and that little data is available. It is however possible to use the current state of knowledge on the evolution of irradiated microstructure and on the processes that influences IASCC to emit hypotheses. This report identifies several potential changes in microstructure and proposes to identify their potential impact of IASCC. The susceptibility of a component to high fluence IASCC is considered to not only depends on the intrinsic IASCC susceptibility of the component due to radiation effects on the material but to also be related to the evolution of the loading history of the material and interaction with the environment as total fluence increases. Single variation type experiments are proposed to be performed with materials that are representative of PWR condition and with materials irradiated in other conditions. To address the lack of IASCC propagation and initiation data generated with material irradiated in PWR condition, it is proposed to investigate the effect of spectrum and flux rate on the evolution of microstructure. A long term irradiation, aimed to generate a well-controlled irradiation history on a set on selected materials is also proposed for consideration. For BWR, the study of available data permitted to identify an area of concern for long term performance of component. The efficiency of hydrogen water chemistry mitigation technology may decrease as fluence increases for high-stress intensity factors. This report describes a program plan to determine the efficiency of hydrogen water chemistry as a function of the stress intensity factor applied and fluence. The use of existing, available, materials and the generation of additional materials via irradiation in a research reactor are considered.

  3. Impacts Analyses Supporting the National Environmental Policy Act Environmental Assessment for the Resumption of Transient Testing Program

    SciTech Connect (OSTI)

    Annette L. Schafer; LLoyd C. Brown; David C. Carathers; Boyd D. Christensen; James J. Dahl; Mark L. Miller; Cathy Ottinger Farnum; Steven Peterson; A. Jeffrey Sondrup; Peter V. Subaiya; Daniel M. Wachs; Ruth F. Weiner

    2014-02-01

    This document contains the analysis details and summary of analyses conducted to evaluate the environmental impacts for the Resumption of Transient Fuel and Materials Testing Program. It provides an assessment of the impacts for the two action alternatives being evaluated in the environmental assessment. These alternatives are (1) resumption of transient testing using the Transient Reactor Test Facility (TREAT) at Idaho National Laboratory (INL) and (2) conducting transient testing using the Annular Core Research Reactor (ACRR) at Sandia National Laboratory in New Mexico (SNL/NM). Analyses are provided for radiologic emissions, other air emissions, soil contamination, and groundwater contamination that could occur (1) during normal operations, (2) as a result of accidents in one of the facilities, and (3) during transport. It does not include an assessment of the biotic, cultural resources, waste generation, or other impacts that could result from the resumption of transient testing. Analyses were conducted by technical professionals at INL and SNL/NM as noted throughout this report. The analyses are based on bounding radionuclide inventories, with the same inventories used for test materials by both alternatives and different inventories for the TREAT Reactor and ACRR. An upper value on the number of tests was assumed, with a test frequency determined by the realistic turn-around times required between experiments. The estimates provided for impacts during normal operations are based on historical emission rates and projected usage rates; therefore, they are bounding. Estimated doses for members of the public, collocated workers, and facility workers that could be incurred as a result of an accident are very conservative. They do not credit safety systems or administrative procedures (such as evacuation plans or use of personal protective equipment) that could be used to limit worker doses. Doses estimated for transportation are conservative and are based on transport of the bounding radiologic inventory that will be contained in any given test. The transportation analysis assumes all transports will contain the bounding inventory.

  4. Sandia National Laboratories performance assessment methodology for long-term environmental programs : the history of nuclear waste management.

    SciTech Connect (OSTI)

    Marietta, Melvin Gary; Anderson, D. Richard; Bonano, Evaristo J.; Meacham, Paul Gregory

    2011-11-01

    Sandia National Laboratories (SNL) is the world leader in the development of the detailed science underpinning the application of a probabilistic risk assessment methodology, referred to in this report as performance assessment (PA), for (1) understanding and forecasting the long-term behavior of a radioactive waste disposal system, (2) estimating the ability of the disposal system and its various components to isolate the waste, (3) developing regulations, (4) implementing programs to estimate the safety that the system can afford to individuals and to the environment, and (5) demonstrating compliance with the attendant regulatory requirements. This report documents the evolution of the SNL PA methodology from inception in the mid-1970s, summarizing major SNL PA applications including: the Subseabed Disposal Project PAs for high-level radioactive waste; the Waste Isolation Pilot Plant PAs for disposal of defense transuranic waste; the Yucca Mountain Project total system PAs for deep geologic disposal of spent nuclear fuel and high-level radioactive waste; PAs for the Greater Confinement Borehole Disposal boreholes at the Nevada National Security Site; and PA evaluations for disposal of high-level wastes and Department of Energy spent nuclear fuels stored at Idaho National Laboratory. In addition, the report summarizes smaller PA programs for long-term cover systems implemented for the Monticello, Utah, mill-tailings repository; a PA for the SNL Mixed Waste Landfill in support of environmental restoration; PA support for radioactive waste management efforts in Egypt, Iraq, and Taiwan; and, most recently, PAs for analysis of alternative high-level radioactive waste disposal strategies including repositories deep borehole disposal and geologic repositories in shale and granite. Finally, this report summarizes the extension of the PA methodology for radioactive waste disposal toward development of an enhanced PA system for carbon sequestration and storage systems. These efforts have produced a generic PA methodology for the evaluation of waste management systems that has gained wide acceptance within the international community. This report documents how this methodology has been used as an effective management tool to evaluate different disposal designs and sites; inform development of regulatory requirements; identify, prioritize, and guide research aimed at reducing uncertainties for objective estimations of risk; and support safety assessments.

  5. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  6. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  7. Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume IX. Reactor and fuel cycle description

    SciTech Connect (OSTI)

    Not Available

    1980-06-01

    The Nonproliferation Alterntive Systems Assessment Program (NASAP) has characterized and assessed various reactor/fuel-cycle systems. Volume IX provides, in summary form, the technical descriptions of the reactor/fuel-cycle systems studied. This includes the status of the system technology, as well as a discussion of the safety, environmental, and licensing needs from a technical perspective. This information was then used in developing the research, development, and demonstration (RD and D) program, including its cost and time frame, to advance the existing technology to the level needed for commercial use. Wherever possible, the cost data are given as ranges to reflect the uncertainties in the estimates.

  8. TECHNOLOGY READINESS ASSESSMENT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOENETL-20151710 U.S. Department of Energy 2014 TECHNOLOGY READINESS ASSESSMENT-CLEAN COAL RESEARCH PROGRAM 2 2014 TECHNOLOGY READINESS ASSESSMENT-CLEAN COAL RESEARCH PROGRAM ...

  9. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  10. Hawaii Energy Strategy program. Annual report 1993

    SciTech Connect (OSTI)

    Not Available

    1993-12-31

    This is the second annual report on the Hawaii Energy Strategy (HES) program which began on March 2, 1992, under a Cooperative Agreement (FCO3-92F19l68) with the United States Department of Energy (USDOE). The HES program is scheduled for completion by December 31, 1994. As outlined in the Statement of Joint Objectives. The purpose of the study is to develop an integrated State of Hawaii energy strategy, including an assessment of the State`s fossil fuel reserve requirements and the most effective way to meet those needs, the availability and practicality of increasing the use of native energy resources, potential alternative fossil energy technologies such as coal gasification and potential energy efficiency measures which could lead to demand reduction. This work contributes to the (US)DOE mission, will reduce the State`s vulnerability to energy supply disruptions and contributes to the public good.

  11. SRNL PHASE 1 ASSESSMENT OF THE WAC/DQO AND UNIT OPERATIONS FOR THE WTP WASTE QUALIFICATION PROGRAM

    SciTech Connect (OSTI)

    Peeler, D.; Adamson, D.; Bannochie, C.; Cozzi, A.; Eibling, R.; Hay, M.; Hansen, E.; Herman, D.; Martino, C.; Nash, C.; Pennebaker, F.; Poirier, M.; Reboul, S.; Stone, M.; Taylor-Pashow, K.; White, T.; Wilmarth, B.

    2012-05-16

    The Hanford Tank Waste Treatment and Immobilization Plant (WTP) is currently transitioning its emphasis from a design and construction phase toward start-up and commissioning. With this transition, the WTP Project has initiated more detailed assessments of the requirements related to actual processing of the Hanford Site tank waste. One particular area of interest is the waste qualification program to be implemented to support the WTP. Given the successful implementation of similar waste qualification efforts at the Savannah River Site (SRS), based on critical technical support and guidance from the Savannah River National Laboratory (SRNL), WTP requested the utilization of subject matter experts from SRNL to support a technology exchange to perform a review of the WTP waste qualification program, discuss the general qualification approach at SRS, and to identify critical lessons learned through the support of DWPF's sludge batch qualification efforts. As part of Phase 1, SRNL subject matter experts in critical technical and/or process areas reviewed specific WTP waste qualification information. The Phase 1 review was a collaborative, interactive, and iterative process between the two organizations. WTP provided specific analytical procedures, descriptions of equipment, and general documentation as baseline review material. SRNL subject matter experts reviewed the information and, as appropriate, requested follow-up information or clarification to specific areas of interest. This process resulted in multiple teleconferences with key technical contacts from both organizations resolving technical issues that lead to the results presented in this report. This report provides the results of SRNL's Phase 1 review of the WAC-DQO waste acceptance criteria and processability parameters, and the specific unit operations which are required to support WTP waste qualification efforts. The review resulted in SRNL providing concurrence, alternative methods, or gap identification for the proposed WTP analytical methods or approaches. For the unit operations, the SRNL subject matter experts reviewed WTP concepts compared to what is used at SRS and provided thoughts on the outlined tasks with respect to waste qualification. Also documented in this report are recommendations and an outline on what would be required for the next phase to further mature the WTP waste qualification program.

  12. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  13. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  14. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  15. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Energy Savers [EERE]

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  16. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  17. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 1

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A.

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation. These Appendices contain the Federal Register Notice, comments on evaluation factors, independent technical reviewers resumes, independent technical reviewers manual, and technology information packages.

  18. Depleted Uranium Hexafluoride Management Program. The technology assessment report for the long-term management of depleted uranium hexafluoride. Volume 2

    SciTech Connect (OSTI)

    Zoller, J.N.; Rosen, R.S.; Holliday, M.A.

    1995-06-30

    With the publication of a Request for Recommendations and Advance Notice of Intent in the November 10, 1994 Federal Register, the Department of Energy initiated a program to assess alternative strategies for the long-term management or use of depleted uranium hexafluoride. This Request was made to help ensure that, by seeking as many recommendations as possible, Department management considers reasonable options in the long-range management strategy. The Depleted Uranium Hexafluoride Management Program consists of three major program elements: Engineering Analysis, Cost Analysis, and an Environmental Impact Statement. This Technology Assessment Report is the first part of the Engineering Analysis Project, and assesses recommendations from interested persons, industry, and Government agencies for potential uses for the depleted uranium hexafluoride stored at the gaseous diffusion plants in Paducah, Kentucky, and Portsmouth, Ohio, and at the Oak Ridge Reservation in Tennessee. Technologies that could facilitate the long-term management of this material are also assessed. The purpose of the Technology Assessment Report is to present the results of the evaluation of these recommendations. Department management will decide which recommendations will receive further study and evaluation.

  19. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions ...

  20. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  1. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  2. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  3. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  4. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  5. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  6. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  7. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  8. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  9. Potential Vulnerability of US Petroleum Refineries to Increasing Water

    Energy Savers [EERE]

    Temperature and/or Reduced Water Availability | Department of Energy Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability This report discusses potential impacts of increased water temperature and reductions in water availability on petroleum refining and presents case studies related to refinery water use. Report

  10. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Energy Savers [EERE]

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  11. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  12. Technical Qualification Program Administrative Forms | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Program Reaccreditation Report - Sandia Site Office Technical Qualification Program Self-Assessment Report - Oak Ridge Office - 2014 Technical Qualification Program...

  13. Programs for Increasing the Engagement of Underrepresented Ethnic Groups and People with Disabilities in HPC. Final assessment report

    SciTech Connect (OSTI)

    Taylor, Valerie

    2012-12-23

    Given the significant impact of computing on society, it is important that all cultures, especially underrepresented cultures, are fully engaged in the field of computing to ensure that everyone benefits from the advances in computing. This proposal is focused on the field of high performance computing. The lack of cultural diversity in computing, in particular high performance computing, is especially evident with respect to the following ethnic groups African Americans, Hispanics, and Native Americans as well as People with Disabilities. The goal of this proposal is to organize and coordinate a National Laboratory Career Development Workshop focused on underrepresented cultures (ethnic cultures and disability cultures) in high performance computing. It is expected that the proposed workshop will increase the engagement of underrepresented cultures in HPC through increased exposure to the excellent work at the national laboratories. The National Laboratory Workshops are focused on the recruitment of senior graduate students and the retention of junior lab staff through the various panels and discussions at the workshop. Further, the workshop will include a community building component that extends beyond the workshop. The workshop was held was held at the Lawrence Livermore National Laboratory campus in Livermore, CA. from June 14 - 15, 2012. The grant provided funding for 25 participants from underrepresented groups. The workshop also included another 25 local participants in the summer programs at Lawrence Livermore National Laboratory. Below are some key results from the assessment of the workshops: 86% of the participants indicated strongly agree or agree to the statement "I am more likely to consider/continue a career at a national laboratory as a result of participating in this workshop." 77% indicated strongly agree or agree to the statement "I plan to pursue a summer internship at a national laboratory." 100% of the participants indicated strongly agree or agree to the statement "The CMD-IT NLPDEV workshop was a valuable experience."

  14. IMPACTS: Industrial Technologies Program, Summary of Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    91 DOE Industrial Technologies Program Appendix 7: Methodology for Technology Tracking and Assessment of Benefits u Technology Tracking......

  15. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  16. Voluntary Agreements for Energy Efficiency or GHG EmissionsReduction in Industry: An Assessment of Programs Around the World

    SciTech Connect (OSTI)

    Price, Lynn

    2005-06-01

    Voluntary agreements for energy efficiency improvement and reduction of energy-related greenhouse gas (GHG) emissions have been a popular policy instrument for the industrial sector in industrialized countries since the 1990s. A number of these national-level voluntary agreement programs are now being modified and strengthened, while additional countries--including some recently industrialized and developing countries--are adopting these type of agreements in an effort to increase the energy efficiency of their industrial sectors.Voluntary agreement programs can be roughly divided into three broad categories: (1) programs that are completely voluntary, (2) programs that use the threat of future regulations or energy/GHG emissions taxes as a motivation for participation, and (3) programs that are implemented in conjunction with an existing energy/GHG emissions tax policy or with strict regulations. A variety of government-provided incentives as well as penalties are associated with these programs. This paper reviews 23 energy efficiency or GHG emissions reduction voluntary agreement programs in 18 countries, including countries in Europe, the U.S., Canada, Australia, New Zealand, Japan, South Korea, and Chinese Taipei (Taiwan) and discusses preliminary lessons learned regarding program design and effectiveness. The paper notes that such agreement programs, in which companies inventory and manage their energy use and GHG emissions to meet specific reduction targets, are an essential first step towards GHG emissions trading programs.

  17. Beryllium Program - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program About Us About Hanford Cleanup Hanford History Hanford Site Wide Programs Beryllium Program Beryllium Program Points of Contact Beryllium Facilities & Areas Beryllium Program Information Hanford CBDPP Committee Beryllium FAQs Beryllium Related Links Hanford Beryllium Awareness Group (BAG) Program Performance Assessments Beryllium Program Feedback Beryllium Health Advocates Primary Contractors/Employers Medical Testing and Surveillance Facilities General Resources Contact Us Beryllium

  18. Protocol for EM Review/Field Self-Assessment of Site Specific Quality Assurance Programs/Quality Implementation Plans

    Broader source: Energy.gov [DOE]

    Review protocol and lines of inquiry that are used as basis for technical review and approval of site-specific quality assurance programs.

  19. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  20. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  1. Goodyear Tire Plant Gains Traction on Energy Savings After Completing Save Energy Now Assessment; Industrial Technologies Program (ITP) Save Energy Now Case Study (Brochure)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Goodyear operates more than 60 facilities in 26 countries, including the Union City, Tennessee, plant pictured above. Goodyear Tire Plant Gains Traction on Energy Savings After Completing Save Energy Now Assessment Saves $875,000 in Energy Costs; Reduces Natural Gas Consumption Industrial Technologies Program Case Study Benefits * Implemented approximately $875,000 in annual energy cost savings * Achieves annual natural gas savings of more than 93,000 MMBtu * Reduces No. 6 fuel oil consumption

  2. Chrysler: Save Energy Now Assessment Enables a Vehicle Assembly Complex to Achieve Significant Natural Gas Savings; Industrial Technologies Program (ITP) Save Energy Now Case Study.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    powerhouse at Chrysler's St. Louis Assembly Complex provides steam, chilled water, and compressed air to both the north and south plants. Chrysler: Save Energy Now Assessment Enables a Vehicle Assembly Complex to Achieve Significant Natural Gas Savings Industrial Technologies Program Case Study Benefits * Achieves annual energy savings of $627,000 * Achieves annual natural gas savings of more than 70,000 MMBtu * Yields a simple payback of just over 2 months Key Findings * Independent evaluations

  3. Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a Petrochemical Plant; Industrial Technologies Program (ITP) Save Energy Now Case Study (Brochure)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dow St. Charles Operations in Hahnville, Louisiana Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a Petrochemical Plant Industrial Technologies Program Case Study Benefits * Saves $1.9 million annually * Achieves annual natural gas savings of 272,000 MMBtu * Achieves a simple payback of 1.5 months Key Findings * Quantifying potential energy savings, especially with the assistance of an outside expert, can provide the impetus for management to take action. * Although Dow

  4. Terra nitrogen Company, L.P.: Ammonia Plant Greatly Reduces Natural Gas Consumption After Energy Assessment. Industrial Technologies Program (ITP) Save Energy Now Case Study.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Terra Nitrogen plant in Verdigris, Oklahoma. Terra Nitrogen Company, L.P.: Ammonia Plant Greatly Reduces Natural Gas Consumption After Energy Assessment Industrial Technologies Program Case Study Benefits * Saves approximately $3.5 million annually * Achieves annual natural gas savings of 497,000 MMBtu * Achieves a simple payback of 11 months Key Findings * Accurately quantifying potential energy savings can provide renewed impetus to reduce energy use. * Although Terra Nitrogen actively managed

  5. Steam System Efficiency Optimized After J.R. Simplot Fertilizer Plant Receives Energy Assessment; Industrial Technologies Program (ITP) Save Energy Now (SEN) Case Study

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    J.R. Simplot Don plant in Pocatello, Idaho, repaired boiler feed water pumps such as the one pictured above, and revised boiler operating practices to reduce steam venting by 17 million pounds annually. Steam System Efficiency Optimized After J.R. Simplot Fertilizer Plant Receives Energy Assessment Industrial Technologies Program Case Study Key Findings * Significant energy savings can be achieved without large capital expenditures. * While the J.R. Simplot company had an active energy

  6. Assessment of Financial Savings from Peer Reviews of In-Progress Projects: A Case Study from the Department of Energy's Hydrogen Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessment of Financial Savings From Peer Reviews of In-Progress Projects: A Case Study from the Department of Energy's Hydrogen Program Prepared By: Yaw O. Agyeman, TMS, Inc. with Jeff Dowd, DOE Office of Energy Efficiency & Renewable Energy Prepared for the Office of Energy Efficiency and Renewable Energy, U.S. Department of Energy October 2008 Acknowledgments: Special thanks go to the following people who provided inputs to the study or review comments on an earlier draft of this paper. *

  7. Annual report of the Environmental Restoration Monitoring and Assessment Program at Oak Ridge National Laboratory for FY 1992. Environmental Restoration Program

    SciTech Connect (OSTI)

    Clapp, R.B.

    1992-09-01

    This report summarizes the salient features of the annual efforts of the investigations and monitoring, conducted to support the Environmental Restoration (ER) Program at Oak Ridge National Laboratory (ORNL). The results presented can be used to develop a conceptual understanding of the key contaminants and the sources, fluxes, and processes affecting their distribution and movement. This information forms a basis for prioritizing sites and for selecting, implementing, and evaluating remedial actions. Groundwater, soils, sediments, and surface water monitoring results are described.

  8. Quality characterization of western Cretaceous coal from the Colorado Plateau as part of the U.S. Geological Survey's National Coal Resource Assessment Program

    SciTech Connect (OSTI)

    Affolter, R.H.; Brownfield, M.E.

    1999-07-01

    The goal of the Colorado Plateau Coal Assessment program is to provide an overview of the geologic setting, distribution, resources, and quality of Cretaceous coal in the Colorado Plateau. This assessment, which is part of the US Geological Survey's National Coal Resource Assessment Program, is different from previous coal assessments in that the major emphasis is placed on coals that are most likely to provide energy over the next few decades. The data is also being collected and stored in digital format that can be updated as new information becomes available. Environmental factors may eventually control how coal will be mined, and determine to what extent measures will be implemented to reduce trace element emissions. In the future, increased emphasis will also be placed on coal combustion products and the challenges of waste product disposal or utilization. Therefore, coal quality characterization is an important aspect of the coal assessment program in that it provides important data that will influence future utilization of this resource. The Colorado Plateau study is being completed in cooperation with the US Bureau of Land Management, US Forest Service, Arizona Geological Survey, Colorado Geological Survey, New Mexico Bureau of Mines and Mineral Resources, and the Utah Geological Survey. Restrictions on coal thickness and overburden will be applied to the resource calculations and the resources will be categorized by land ownership. In some areas these studies will also delineate areas where coal mining may be restricted because of land use, industrial, social, or environmental factors. Emphasis is being placed on areas where the coal is controlled by the Federal Government.

  9. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  10. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior

  11. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  12. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  13. Beryllium Program Feedback - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hanford Site Wide Programs Beryllium Program Beryllium Program Feedback About Us Beryllium Program Beryllium Program Points of Contact Beryllium Facilities & Areas Beryllium Program Information Hanford CBDPP Committee Beryllium FAQs Beryllium Related Links Hanford Beryllium Awareness Group (BAG) Program Performance Assessments Beryllium Program Feedback Beryllium Health Advocates Primary Contractors/Employers Medical Testing and Surveillance Facilities General Resources Beryllium Program

  14. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  15. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    SciTech Connect (OSTI)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).

  16. Building Technologies Program Multi-Year Program Plan Program Portfolio Management 2008

    SciTech Connect (OSTI)

    None, None

    2008-01-01

    Building Technologies Program Multi-Year Program Plan 2008 for program portfolio management, including the program portfolio management process, program analysis, performance assessment, stakeholder interactions, and cross-cutting issues.

  17. Hawaii Energy Strategy program. Annual report, 1992

    SciTech Connect (OSTI)

    Not Available

    1992-12-31

    The Hawaii Energy Strategy (HES) program began on March 2, 1992, under United States Department of Energy Cooperative Agreement DE-FC03-92F19168, and is scheduled for completion by December 31, 1994. As outlined in the Statement of Joint Objectives: The purpose of the study is to develop an integrated State of Hawaii energy strategy, including an assessment of the State`s fossil fuel reserve requirements and the most effective way to meet those needs, the availability and practicality of increasing the use of native energy resources, potential alternative fossil energy technologies such as coal gasification and potential energy efficiency measures which could lead to demand reduction. This work contributes to the DOE mission, will reduce the State`s vulnerability to energy supply disruptions and contributes to the public good.

  18. Hawaii Energy Strategy program. [First Annual Report

    SciTech Connect (OSTI)

    Not Available

    1992-01-01

    The Hawaii Energy Strategy (HES) program began on March 2, 1992, under United States Department of Energy Cooperative Agreement DE-FC03-92F19168, and is scheduled for completion by December 31, 1994. As outlined in the Statement of Joint Objectives: The purpose of the study is to develop an integrated State of Hawaii energy strategy, including an assessment of the State's fossil fuel reserve requirements and the most effective way to meet those needs, the availability and practicality of increasing the use of native energy resources, potential alternative fossil energy technologies such as coal gasification and potential energy efficiency measures which could lead to demand reduction. This work contributes to the DOE mission, will reduce the State's vulnerability to energy supply disruptions and contributes to the public good.

  19. Integrated Assessment | Open Energy Information

    Open Energy Info (EERE)

    URI: cleanenergysolutions.orgcontenttimes-integrated-assessment-model-0,h Language: English Policies: Deployment Programs DeploymentPrograms: Technical Assistance...

  20. Quarterly Report for LANL Activities: FY12-Q2 National Risk Assessment Partnership (NRAP): Industrial Carbon Capture Program

    SciTech Connect (OSTI)

    Pawar, Rajesh J.

    2012-04-17

    This report summarizes progress of LANL activities related to the tasks performed under the LANL FWP FE102-002-FY10, National Risk Assessment Partnership (NRAP): Industrial Carbon Capture Program. This FWP is funded through the American Recovery and Reinvestment Act (ARRA). Overall, the NRAP activities are focused on understanding and evaluating risks associated with large-scale injection and long-term storage of CO{sub 2} in deep geological formations. One of the primary risks during large-scale injection is due to changes in geomechanical stresses to the storage reservoir, to the caprock/seals and to the wellbores. These changes may have the potential to cause CO{sub 2} and brine leakage and geochemical impacts to the groundwater systems. While the importance of these stresses is well recognized, there have been relatively few quantitative studies (laboratory, field or theoretical) of geomechanical processes in sequestration systems. In addition, there are no integrated studies that allow evaluation of risks to groundwater quality in the context of CO{sub 2} injection-induced stresses. The work performed under this project is focused on better understanding these effects. LANL approach will develop laboratory and computational tools to understand the impact of CO{sub 2}-induced mechanical stress by creating a geomechanical test bed using inputs from laboratory experiments, field data, and conceptual approaches. The Geomechanical Test Bed will be used for conducting sensitivity and scenario analyses of the impacts of CO{sub 2} injection. The specific types of questions will relate to fault stimulation and fracture inducing stress on caprock, changes in wellbore leakage due to evolution of stress in the reservoir and caprock, and the potential for induced seismicity. In addition, the Geomechanical Test Bed will be used to investigate the coupling of stress-induced leakage pathways with impacts on groundwater quality. LANL activities are performed under two tasks: (1) develop laboratory and computational tools to understand CO{sub 2}-induced mechanical impacts and (2) use natural analog sites to determine potential groundwater impacts. We are using the Springerville-St. John Dome as a field site for collecting field data on CO{sub 2} migration through faults and groundwater impacts as well as developing and validating computational models. During the FY12 second quarter we have been working with New England Research Company to construct a tri-axial core-holder. We have built fluid control system for the coreflood system that can be ported to perform in-situ imaging of core. We have performed numerical simulations for groundwater impacts of CO{sub 2} and brine leakage using the reservoir model for Springerville-St John's Dome site. We have analyzed groundwater samples collected from Springerville site for major ion chemistry and isotopic composition. We are currently analyzing subsurface core and chip samples acquired for mineralogical composition.

  1. Industrial Energy Efficiency Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Industrial Energy Efficiency Assessments Industrial Energy Efficiency Assessments Details about the Industrial Energy Efficiency Assessments program and its implementation in...

  2. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarn et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  3. U.S. Climate Change Science Program Scientific Assessment of the Effects of Global Change on the United States.

    National Nuclear Security Administration (NNSA)

    Scientific Assessment of the Effects of Global Change on the United States A Report of the Committee on Environment and Natural Resources National Science and Technology Council May 2008 Scientific Assessment of the Effects of Global Change on the United States ii Committee on the Environment and Natural Resources National Science and Technology Council George Gray Environmental Protection Agency Conrad Lautenbacher National Oceanic and Atmospheric Administration Sharon Hays Office of Science

  4. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  5. Environmental, Health and Safety Assessment: ATS 7H Program (Phase 3R) Test Activities at the GE Power Systems Gas Turbine Manufacturing Facility, Greenville, SC

    SciTech Connect (OSTI)

    1998-11-17

    International Technology Corporation (IT) was contracted by General Electric Company (GE) to assist in the preparation of an Environmental, Health and Safety (HI&3) assessment of the implementation of Phase 3R of the Advanced Turbine System (ATS) 7H program at the GE Gas Turbines facility located in Greenville, South Carolina. The assessment was prepared in accordance with GE's contractual agreement with the U.S. Department of Energy (GE/DOE Cooperative Agreement DE-FC21-95MC3 1176) and supports compliance with the requirements of the National Environmental Policy Act of 1970. This report provides a summary of the EH&S review and includes the following: General description of current site operations and EH&S status, Description of proposed ATS 7H-related activities and discussion of the resulting environmental, health, safety and other impacts to the site and surrounding area. Listing of permits and/or licenses required to comply with federal, state and local regulations for proposed 7H-related activities. Assessment of adequacy of current and required permits, licenses, programs and/or plans.

  6. Joint environmental assessment 1997--2001 of the California Department of Food and Agriculture Curly Top Virus Control Program for Bureau of Land Management and Department of Energy

    SciTech Connect (OSTI)

    1997-03-01

    The DOE, Naval Petroleum reserves in California (NPRC), proposes to sign an Amendment to the Cooperative Agreement and Supplement with the California Department of Food and Agriculture (CDFA) to extend the term of the Curly Top Virus Control Program (CTVCP) in California. This program involves Malathion spraying on NPRC lands to control the beet leafhopper, over a five year period from 1997 through 2001. It is expected that approximately 330 acres on Naval Petroleum Reserve Number 1 (NPR-1) and approximately 9,603 acres on Naval Petroleum Reserve Number 2 (NPR-2) will be treated with Malathion annually by CDFA during the course of this program. The actual acreage subject to treatment can vary from year to year. Pursuant to the requirements of the National Environmental Policy Act of 1969 (NEPA), as amended, the potential impacts of the proposed action were analyzed in a Joint Environmental Assessment (DOE/EA-1011) with the US Department of Interior, Bureau of Land Management (BLM) acting as lead agency, in consultation with the CDFA, and the DOE acting as a cooperating agency. Based on the analysis in the EA, DOE has determined that the conduct of the Curly Top Virus Control Program in California is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the NEPA. Therefore, the preparation of an Environmental Impact Statement is not required and DOE is consequently issuing a FONSI.

  7. Embedding climate change risk assessment within a governance context

    SciTech Connect (OSTI)

    Preston, Benjamin L

    2011-01-01

    Climate change adaptation is increasingly being framed in the context of climate risk management. This has contributed to the proliferation of climate change vulnerability and/or risk assessments as means of supporting institutional decision-making regarding adaptation policies and measures. To date, however, little consideration has been given to how such assessment projects and programs interact with governance systems to facilitate or hinder the implementation of adaptive responses. An examination of recent case studies involving Australian local governments reveals two key linkages between risk assessment and the governance of adaptation. First, governance systems influence how risk assessment processes are conducted, by whom they are conducted, and whom they are meant to inform. Australia s governance system emphasizes evidence-based decision-making that reinforces a knowledge deficit model of decision support. Assessments are often carried out by external experts on behalf of local government, with limited participation by relevant stakeholders and/or civil society. Second, governance systems influence the extent to which the outputs from risk assessment activities are translated into adaptive responses and outcomes. Technical information regarding risk is often stranded by institutional barriers to adaptation including poor uptake of information, competition on the policy agenda, and lack of sufficient entitlements. Yet, risk assessments can assist in bringing such barriers to the surface, where they can be debated and resolved. In fact, well-designed risk assessments can contribute to multi-loop learning by institutions, and that reflexive problem orientation may be one of the more valuable benefits of assessment.

  8. Preliminary assessment report for Grubbs/Kyle Training Center, Smyrna/Rutherford County Regional Airport, Installation 47340, Smyrna, Tennessee. Installation Restoration Program

    SciTech Connect (OSTI)

    Dennis, C.; Stefano, J.

    1993-07-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Tennessee Army National Guard (TNARNG) property near Smyrna, Tennessee. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Grubbs/Kyle Training Center property, the requirement of the Department of Defense Installation Restoration Program.

  9. Environmental assessment for the Atmospheric Radiation Measurement (ARM) Program: Southern Great Plains Cloud and Radiation Testbed (CART) site

    SciTech Connect (OSTI)

    Policastro, A.J.; Pfingston, J.M.; Maloney, D.M.; Wasmer, F.; Pentecost, E.D.

    1992-03-01

    The Atmospheric Radiation Measurement (ARM) Program is aimed at supplying improved predictive capability of climate change, particularly the prediction of cloud-climate feedback. The objective will be achieved by measuring the atmospheric radiation and physical and meteorological quantities that control solar radiation in the earth`s atmosphere and using this information to test global climate and related models. The proposed action is to construct and operate a Cloud and Radiation Testbed (CART) research site in the southern Great Plains as part of the Department of Energy`s Atmospheric Radiation Measurement Program whose objective is to develop an improved predictive capability of global climate change. The purpose of this CART research site in southern Kansas and northern Oklahoma would be to collect meteorological and other scientific information to better characterize the processes controlling radiation transfer on a global scale. Impacts which could result from this facility are described.

  10. Annual report of the Environmental Restoration Monitoring and Assessment Program at Oak Ridge National Laboratory for FY 1992

    SciTech Connect (OSTI)

    Clapp, R.B.

    1992-09-01

    This report summarizes the salient features of the annual efforts of the investigations and monitoring, conducted to support the Environmental Restoration (ER) Program at Oak Ridge National Laboratory (ORNL). The results presented can be used to develop a conceptual understanding of the key contaminants and the sources, fluxes, and processes affecting their distribution and movement. This information forms a basis for prioritizing sites and for selecting, implementing, and evaluating remedial actions. Groundwater, soils, sediments, and surface water monitoring results are described.

  11. Technical and Political Assessment of Peaceful Nuclear Power Program Prospects in North Africa and the Middle East

    SciTech Connect (OSTI)

    Windsor, Lindsay K.; Kessler, Carol E.

    2007-09-11

    An exceptional number of Middle Eastern and North African nations have recently expressed interest in developing nuclear energy for peaceful purposes. Many of these countries have explored nuclear research in limited ways in the past, but the current focused interest and application of resources towards developing nuclear-generated electricity and nuclear-powered desalination plants is unprecedented. Consequently, questions arise in response to this emerging trend: What instigated this interest? To what end(s) will a nuclear program be applied? Does the country have adequate technical, political, legislative, nonproliferation, and safety infrastructure required for the capability desired? If so, what are the next steps for a country in preparation for a future nuclear program? And if not, what collaboration efforts are possible with the United States or others? This report provides information on the capabilities and interests of 13 countries in the region in nuclear energy programs in light of safety, nonproliferation and security concerns. It also provides information useful for determining potential for offering technical collaboration, financial aid, and/or political support.

  12. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  13. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  14. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Energy Savers [EERE]

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. PDF icon Lessons Learned from Cyber

  15. Environmental assessment for the satellite power system-concept development and evaluation program-microwave health and ecological effects

    SciTech Connect (OSTI)

    Not Available

    1980-11-01

    This report is concerned with the potential health and ecological effects of the microwave beam from the microwave power transmission system (MPTS) of the satellite power system (SPS). The report is written in the form of a detailed critical review of selected scientific articles from the published literature on the biological effects of nonionizing electromagnetic radiation, followed by an assessment of the possible effects of the SPS, based on exposure values for the reference system (US DOE and NASA, 1978).

  16. Impacts Analyses Supporting the National Environmental Policy Act Environmental Assessment for the Resumption of Transient Testing Program

    SciTech Connect (OSTI)

    Annette L. Schafer; Lloyd C. Brown; David C. Carathers; Boyd D. Christensen; James J. Dahl; Mark L. Miller; Cathy Ottinger Farnum; Steven Peterson; A. Jeffrey Sondrup; Peter V. Subaiya; Daniel M. Wachs; Ruth F. Weiner

    2013-11-01

    Environmental and health impacts are presented for activities associated with transient testing of nuclear fuel and material using two candidate test reactors. Transient testing involves irradiation of nuclear fuel or materials for short time-periods under high neutron flux rates. The transient testing process includes transportation of nuclear fuel or materials inside a robust shipping cask to a hot cell, removal from the shipping cask, pre-irradiation examination of the nuclear materials, assembly of an experiment assembly, transportation of the experiment assembly to the test reactor, irradiation in the test reactor, transport back to the hot cell, and post-irradiation examination of the nuclear fuel or material. The potential for environmental or health consequences during the transportation, examination, and irradiation actions are assessed for normal operations, off-normal (accident) scenarios, and transportation. Impacts to the environment (air, soil, and groundwater), are assessed during each phase of the transient testing process. This report documents the evaluation of potential consequences to the general public. This document supports the Environmental Assessment (EA) required by the U.S. National Environmental Policy Act (NEPA) (42 USC Subsection 4321 et seq.).

  17. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  18. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions

  19. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  20. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  1. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  2. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  3. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  4. Long-Term Climate Change Assessment Task for the Hanford Site Permanent Isolation Barrier Development Program: Status through FY 1992

    SciTech Connect (OSTI)

    Petersen, K.L.; Chatters, J.C.

    1993-07-01

    The Hanford Site Permanent Isolation Barrier Development Program (Barrier Development Program) was organized (Adams and Wing 1986) to develop the technology needed to provide an in-place disposal capability for the US Department of Energy at the Hanford Site in southeastern Washington. The goals of the Barrier Development Program are to provide defensible evidence that final barrier design(s) will adequately control water infiltration, plant and animal intrusion, and wind and water erosion for a minimum of 1,000 years; to isolate wastes from the accessible environment; and to use markers to warn inadvertent human intruders. Evidence for barrier performance will be obtained by conducting laboratory experiments, field tests, computer modeling, and other studies that establish confidence in the barrier`s ability to meet its 1,000-year design life. The performance and stability of natural barrier analogs that have existed for several millennia and the reconstruction of climate changes during the past 10,000 to 125,000 years also will provide insight into bounding conditions of possible future changes and increase confidence in the barriers design. In the following discussion the term {open_quotes}long-term{close_quotes} references periods of time up to 1000`s of years, distinguishing it from {open_quotes}short-term{close_quotes} weather patterns covering a decade or less. Specific activities focus on planning and conducting a series of studies and tests required to confirm key aspects of the barrier design. The effort is a collaborative one between scientists and engineers from Westinghouse Hanford Company (Westinghouse Hanford) and Pacific Northwest Laboratory (PNL) to design barriers to limit movement of radionuclides and other contaminants to the accessible environment for at least 1,000 years. These activities have been divided into 14 groups of tasks that aid in the complete development of protective barrier and warning marker system.

  5. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  6. Vulnerability Analysis of Energy Delivery Control Systems - 2011 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Systems - 2011 Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy delivery systems has emerged as one of the Nation's most serious grid modernization and infrastructure protection issues. Cyber adversaries are becoming increasingly targeted, sophisticated, and better financed. The energy sector must research, develop and deploy new cybersecurity capabilities faster than the adversary can launch new attack tools and techniques. The

  7. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use

  8. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  9. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  10. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Environmental Management (EM)

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  11. Installation Restoration Program (IRP) preliminary assessment of the 154th air control squadron. 154th air control squadron, Kekkaha Armory, Hawaii Air National Guard, Kekaha, Kauai, Hawaii. Final report

    SciTech Connect (OSTI)

    1995-01-01

    The document identifies ANGRC attempt to assess possible Installation Restoration Program sites at the station. The process involves research via personal interviews, record searches, review historic data, assessing `As Built Drawings`, aerial photographs, and a site visit. Site investigations of hazardous wastes, installation restoration, soil pollution, site investigations, fuel contamination at air force facilities.

  12. IMPACTS: Industrial Technologies Program, Summary of Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    181 DOE Industrial Technologies Program Appendix 5: Method of Calculating Results for the Save Energy Now Initiative u Large Plant Assessments ......

  13. Technical Qualification Program Accreditation Objectives and...

    Office of Environmental Management (EM)

    Objectives and Criteria More Documents & Publications Technical Qualification Program Self-Assessment Report - Sandia Site Office - 2012 Technical Qualification Program...

  14. Voluntary Protection Programs Participants' Association (VPPPA...

    Office of Environmental Management (EM)

    Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA)...

  15. 2009 Voluntary Protection Programs Participants' Association...

    Office of Environmental Management (EM)

    Programs Participants' Association (VPPPA) Presentation: Conducting your Annual VPP Self Assessment 2009 Voluntary Protection Programs Participants' Association (VPPPA)...

  16. Beryllium Program Information - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program Information About Us Beryllium Program Beryllium Program Points of Contact Beryllium Facilities & Areas Beryllium Program Information Hanford CBDPP Committee Beryllium FAQs Beryllium Related Links Hanford Beryllium Awareness Group (BAG) Program Performance Assessments Beryllium Program Feedback Beryllium Health Advocates Primary Contractors/Employers Medical Testing and Surveillance Facilities General Resources Beryllium Program Information Email Email Page | Print Print Page |Text

  17. Assessment of the measurement control program for solution assay instruments at the Los Alamos National Laboratory Plutonium Facility

    SciTech Connect (OSTI)

    Goldman, A.S.

    1985-05-01

    This report documents and reviews the measurement control program (MCP) over a 27-month period for four solution assay instruments (SAIs) Facility. SAI measurement data collected during the period January 1982 through March 1984 were analyzed. The sources of these data included computer listings of measurements emanating from operator entries on computer terminals, logbook entries of measurements transcribed by operators, and computer listings of measurements recorded internally in the instruments. Data were also obtained from control charts that are available as part of the MCP. As a result of our analyses we observed agreement between propagated and historical variances and concluded instruments were functioning properly from a precision aspect. We noticed small, persistent biases indicating slight instrument inaccuracies. We suggest that statistical tests for bias be incorporated in the MCP on a monthly basis and if the instrument bias is significantly greater than zero, the instrument should undergo maintenance. We propose the weekly precision test be replaced by a daily test to provide more timely detection of possible problems. We observed that one instrument showed a trend of increasing bias during the past six months and recommend a randomness test be incorporated to detect trends in a more timely fashion. We detected operator transcription errors during data transmissions and advise direct instrument transmission to the MCP to eliminate these errors. A transmission error rate based on those errors that affected decisions in the MCP was estimated as 1%. 11 refs., 10 figs., 4 tabs.

  18. Taking Risk Assessment and Management to the Next Level: Program-Level Risk Analysis to Enable Solid Decision-Making on Priorities and Funding

    SciTech Connect (OSTI)

    Nelson, J. G.; Morton, R. L.; Castillo, C.; Dyer, G.; Johnson, N.; McSwain, J. T.

    2011-02-01

    A multi-level (facility and programmatic) risk assessment was conducted for the facilities in the Nevada National Security Site (NNSS) Readiness in Technical Base and Facilities (RTBF) Program and results were included in a new Risk Management Plan (RMP), which was incorporated into the fiscal year (FY) 2010 Integrated Plans. Risks, risk events, probability, consequence(s), and mitigation strategies were identified and captured, for most scope areas (i.e., risk categories) during the facilitated risk workshops. Risk mitigations (i.e., efforts in addition to existing controls) were identified during the facilitated risk workshops when the risk event was identified. Risk mitigation strategies fell into two broad categories: threats or opportunities. Improvement projects were identified and linked to specific risks they mitigate, making the connection of risk reduction through investments for the annual Site Execution Plan. Due to the amount of that was collected, analysis to be performed, and reports to be generated, a Risk Assessment/ Management Tool (RAMtool) database was developed to analyze the risks in real-time, at multiple levels, which reinforced the site-level risk management process and procedures. The RAMtool database was developed and designed to assist in the capturing and analysis of the key elements of risk: probability, consequence, and impact. The RAMtool calculates the facility-level and programmatic-level risk factors to enable a side-by-side comparison to see where the facility manager and program manager should focus their risk reduction efforts and funding. This enables them to make solid decisions on priorities and funding to maximize the risk reduction. A more active risk management process was developed where risks and opportunities are actively managed, monitored, and controlled by each facility more aggressively and frequently. risk owners have the responsibility and accountability to manage their assigned risk in real-time, using the RAMtool database.

  19. Savannah River Ecology Laboratory - Outreach Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program

  20. Savannah River Ecology Laboratory - Outreach Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Program

  1. Integrated Risk Assessment for the LaSalle Unit 2 Nuclear Power Plant, Phenomenology and Risk Uncertainty Evaluation Program (PRUEP), MELCOR code calculations. Volume 3

    SciTech Connect (OSTI)

    Shaffer, C.J. [Science and Engineering Associates, Albuquerque, NM (United States); Miller, L.A.; Payne, A.C. Jr.

    1992-10-01

    A Level III Probabilistic Risk Assessment (PRA) has been performed for LaSalle Unit 2 under the Risk Methods Integration and Evaluation Program (RMIEP) and the Phenomenology and Risk Uncertainty Evaluation Program (PRUEP). This report documents the phenomenological calculations and sources of. uncertainty in the calculations performed with HELCOR in support of the Level II portion of the PRA. These calculations are an integral part of the Level II analysis since they provide quantitative input to the Accident Progression Event Tree (APET) and Source Term Model (LASSOR). However, the uncertainty associated with the code results must be considered in the use of the results. The MELCOR calculations performed include four integrated calculations: (1) a high-pressure short-term station blackout, (2) a low-pressure short-term station blackout, (3) an intermediate-term station blackout, and (4) a long-term station blackout. Several sensitivity studies investigating the effect of variations in containment failure size and location, as well as hydrogen ignition concentration are also documented.

  2. Integrated Risk Assessment for the LaSalle Unit 2 Nuclear Power Plant, Phenomenology and Risk Uncertainty Evaluation Program (PRUEP), MELCOR code calculations

    SciTech Connect (OSTI)

    Shaffer, C.J. (Science and Engineering Associates, Albuquerque, NM (United States)); Miller, L.A.; Payne, A.C. Jr.

    1992-10-01

    A Level III Probabilistic Risk Assessment (PRA) has been performed for LaSalle Unit 2 under the Risk Methods Integration and Evaluation Program (RMIEP) and the Phenomenology and Risk Uncertainty Evaluation Program (PRUEP). This report documents the phenomenological calculations and sources of. uncertainty in the calculations performed with HELCOR in support of the Level II portion of the PRA. These calculations are an integral part of the Level II analysis since they provide quantitative input to the Accident Progression Event Tree (APET) and Source Term Model (LASSOR). However, the uncertainty associated with the code results must be considered in the use of the results. The MELCOR calculations performed include four integrated calculations: (1) a high-pressure short-term station blackout, (2) a low-pressure short-term station blackout, (3) an intermediate-term station blackout, and (4) a long-term station blackout. Several sensitivity studies investigating the effect of variations in containment failure size and location, as well as hydrogen ignition concentration are also documented.

  3. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  4. Preliminary assessment report for Bee Caves Armory (former Nike BG-80 Fire Control Facility), Installation 48055, Austin, Texas. Installation Restoration Program

    SciTech Connect (OSTI)

    Dennis, C.

    1993-08-01

    This report presents the results of the preliminary assessment (PA) conducted by Argonne National Laboratory at the Texas Army National Guard (ARNG) property in Austin, Texas. Preliminary assessments of federal facilities are being conducted to compile the information necessary for completing, preremedial activities and to provide a basis for establishing corrective actions in response to releases of hazardous substances. The principal objective of the PA is to characterize the site accurately and determine the need for further action by examining, site activities, quantities of hazardous substances present, and potential pathways by which contamination could affect public health and the environment. This PA satisfies, for the Bee Caves Armory property, the requirements of the Department of Defense Installation Restoration Program. Of concern is the potential for hazardous waste to be present on the property as a result of the former Nike Missile Base operations or in the form of original construction materials. Environmentally sensitive operations associated with the property from that period include (1) underground fuel storage, (2) hazardous materials storage/use, (3) disposal of hazardous waste and (4) release of hazardous waste water.

  5. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  6. Integrating environmental justice (EJ) methodologies into environmental impact assessment

    SciTech Connect (OSTI)

    Zimmerman, R.

    1995-12-01

    Environmental Justice (EJ) concerns are now a pervasive part of environmental policy. Moreover, Federal Executive Order 12898 mandates its diffusion throughout federal government programs, and many states are developing similar programs. EJ concerns first arose in the environmental field in the context of hazardous waste facilities. Thus, hazardous waste applications provide important analytical models for EJ issues addressed in other programs, such as environmental assessment (EA). At the present time, EJ concerns are treated largely qualitatively in EAs and environmental impact statements (EISs) in sections dealing with neighborhood and community character or socioeconomics. The manner in which EJ issues are examined in EISs is described using examples from recent EISs, and an approach to quantifying EJ in terms of demographic patterns is presented using techniques previously applied by the author to hazardous waste sites (primarily sites on the National Priorities List under the Superfund program). Various geographic levels and demographic parameters are discussed and compared. A key point is the manner in which the choice of a comparison area influences conclusions about a particular area. these methods are critical in addressing such issues as whether proposed projects are being located in areas with relatively greater proportions of {open_quotes}vulnerable{close_quotes} populations or, in the case of public service projects, how these populations are served relative to other populations by the facilities that are the subject of the assessment.

  7. Commonwealth Wind Program

    Broader source: Energy.gov [DOE]

    Through the Commonwealth Wind Program, the Massachusetts Clean Energy Center (MassCEC) offers site assessment grants of services, feasibility study grants, and development grants and loans for...

  8. Laser programs highlights 1994

    SciTech Connect (OSTI)

    1994-12-31

    This report provides highlights of the Lawrence Livermore National Laboratories` laser programs. Laser uses and technology assessment and utilization are provided.

  9. Energy Assessment Helps Kaiser Aluminum Save Energy and Improve Productivity; DOE Software Adopted as Standard for Analyzing Plant Process Heating Systems Company-Wide; Industrial Technologies Program (ITP) Save Energy Now (SEN) Case Study

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Kaiser Aluminum plant in Sherman, Texas, improved its annual furnace energy intensity by 11.1% after imple- menting recommendations from the Save Energy Now assessment. Energy Assessment Helps Kaiser Aluminum Save Energy and Improve Productivity DOE Software Adopted as Standard for Analyzing Plant Process Heating Systems Company-Wide Industrial Technologies Program Case Study Key Findings * Opportunities for energy efficiency do not require large capital expenditures to achieve significant

  10. An Assessment of the Current Day Impact of Various Materials Associated with the U.S. Nuclear Test Program in the Marshall Island

    SciTech Connect (OSTI)

    Robison, W L; Noshkin, V E; Hamilton, T F; Conrado, C L; Bogen, K T

    2001-05-01

    Different stable elements, and some natural and man-made radionuclides, were used as tracers or associated in other ways with nuclear devices that were detonated at Bikini and Enewetak Atolls as part of the U.S. nuclear testing program from 1946 through 1958. The question has been raised whether any of these materials dispersed by the explosions could be of sufficient concentration in either the marine environment or on the coral islands to be of a health concern to people living, or planning to live, on the atolls. This report addresses that concern. An inventory of the materials involved during the test period was prepared and provided to us by the Office of Defense Programs (DP) of the United States Department of Energy (DOE). The materials that the DOE and the Republic of the Marshall Islands (RMI) ask to be evaluated are--sulfur, arsenic, yttrium, tantalum, gold, rhodium, indium, tungsten, thallium, thorium-230,232 ({sup 230,232}Th), uranium-233,238 ({sup 233,238}U), polonium-210 ({sup 210}Po), curium-232 ({sup 232}Cu), and americium-241 ({sup 241}Am). The stable elements were used primarily as tracers for determining neutron energy and flux, and for other diagnostic purposes in the larger yield, multistage devices. It is reasonable to assume that these materials would be distributed in a similar manner as the fission products subsequent to detonation. A large inventory of fission product and uranium data was available for assessment. Detailed calculations show only a very small fraction of the fission products produced during the entire test series remain at the test site atolls. Consequently, based on the information provided, we conclude that the concentration of these materials in the atoll environment pose no adverse health effects to humans.

  11. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  12. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  13. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  14. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  15. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  16. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  17. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  18. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  19. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  20. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  1. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  2. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  3. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  4. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  5. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  6. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  7. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  8. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks.

  9. U-181: IBM WebSphere Application Server Information Disclosure Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information.

  10. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  11. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  13. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  14. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  15. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  16. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 96: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  17. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device.

  18. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  19. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  20. Socioeconomic Assessment and Research Program

    SciTech Connect (OSTI)

    Poyer, David A.

    2013-03-16

    Preliminary review and analyses of residential energy consumption surveys' (various) comparing levels of energy expenditures across population categories.