National Library of Energy BETA

Sample records for vulnerability identification defense

  1. Freedom to mix vulnerable offensive and defensive forces

    SciTech Connect (OSTI)

    Canavan, G.H.

    1998-09-01

    The freedom to mix offense and defense to expand without diminishing either side`s second strike capability is shown to be counterproductive at large numbers of missiles; effective at intermediate numbers; and progressively less effective at modest numbers. Solutions are less stable for large second strikes.

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  5. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  6. defense

    National Nuclear Security Administration (NNSA)

    >Madelyn Creedon, Assistant Secretary for Global Strategic Affairs
    Andrew Weber, Assistant Secretary of Defense for Nuclear, Chemical & Biological Defense...

  7. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  8. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  9. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  10. U-141: Sourcefire Defense Center Bugs

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system.

  11. Defense Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Gallery Defense Gallery Exhibits in this gallery capture Laboratory's activities to fulfill its central mission to ensure the safety, security, and reliability of the U.S. nuclear deterrent while reducing the global threat of nuclear, chemical, and biological weapons. August 18, 2014 museum plan showing the defense gallery Laboratory provides the necessary expertise and technology developed here to help the nation respond effectively to significant threats of broad scope and to help make

  12. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  13. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs

  14. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  15. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  16. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  17. Natural Resources Defense Council

    Broader source: Energy.gov [DOE]

    Comments of the Natural Resource Defense Council on The Department of Energy’s Executive Order 13563 Preliminary Plan Submitted on August 1, 2011

  18. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  19. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  20. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  1. Defense Nuclear Facility Safety Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2014 Defense Nuclear Facility Safety Board Defense Nuclear Facility Safety Board (DNSFB) Vice Chairwoman Jesse Roberson visited and toured the WIPP site this week. While...

  2. Climate Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  3. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the

  4. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management ...

  5. Defense Waste Management Programs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Waste Management Programs - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  6. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect (OSTI)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  7. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  8. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  9. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  10. defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense Admiral Haney visits New Mexico labs Admiral Cecil D. Haney, Commander of USSTRATCOM, recently visited Los Alamos and Sandia national laboratories. Admiral Haney and Lab ...

  11. NNSA and Defense Nuclear Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Defense Nuclear Facilities Safety Board certifications free up 47 million in previously allocated funding October 2, 2009 Los Alamos, New Mexico, Oct. 2, 2009 - The Chemistry...

  12. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  13. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect (OSTI)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  14. United States Department of Defense | Open Energy Information

    Open Energy Info (EERE)

    Defense Jump to: navigation, search Logo: United States Department of Defense Name: United States Department of Defense Address: 1000 Defense Pentagon Place: Washington, District...

  15. Independent Activity Report, Defense Nuclear Facilities Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

  16. Environmental Defense Fund | Open Energy Information

    Open Energy Info (EERE)

    Defense is dedicated to protecting the environmental rights of all people, including future generations. References: Environmental Defense Fund1 This article is a stub. You can...

  17. OFFICE OF THE UNDER SECRETARY OF DEFENSE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND...

  18. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  19. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  20. Listing of Defense Nuclear Facilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Listing of Defense Nuclear Facilities The facilities listed below are considered DOE defense nuclear facilities for purposes of Section 3161. Kansas City Plant Pinellas Plant Mound Facility Fernald Environmental Management Project Site Pantex Plant Rocky Flats Environmental Technology Site, including the Oxnard Facility Savannah River Site Los Alamos National Laboratory Sandia National Laboratory Lawrence Livermore National Laboratory Oak Ridge National Laboratory Nevada Test Site 1 Y-12 Plant

  1. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  2. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  3. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  4. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  5. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  6. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  7. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  8. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  9. Defense against common mode failures in protection system design

    SciTech Connect (OSTI)

    Wyman, R.H.; Johnson, G.L.

    1997-08-27

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ``fact-of-life`` in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D&D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D&D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ``defense-in-depth and diversity analysis`` has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided.

  10. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  11. National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense Authorization Act for Fiscal Year 1993 (Public Law 102-484) called for the Secretary to establish and carry out a program for the identification and on-going medical evaluation of its former employees who are subject to significant health risks as a result of the exposure of such employees to

  12. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  13. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  14. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered ... Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems ...

  15. US Energy Sector Vulnerabilities to Climate Change

    Broader source: Energy.gov (indexed) [DOE]

    Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND ... and International Affairs (DOE-PI) and the National Renewable Energy Laboratory (NREL). ...

  16. Vulnerability Analysis of Energy Delivery Control Systems

    Broader source: Energy.gov (indexed) [DOE]

    ... Attackers can search for vulnerabilities in firewalls, ... organization, measured in terms of confidentiality, ... in which an adversary can enter the system and potentially ...

  17. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  18. 5th Defense Renewable Energy Summit

    Broader source: Energy.gov [DOE]

    The 5th Defense Renewable Energy Summit brings together U.S. Department of Defense (DOD) and military decision-makers with renewable energy developers, utilities, and leading financiers to...

  19. Homeland Security and Defense Applications

    SciTech Connect (OSTI)

    2014-11-06

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  20. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  1. Issues in national missile defense

    SciTech Connect (OSTI)

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any of them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.

  2. Defense Technical Information Center thesaurus (Technical Report...

    Office of Scientific and Technical Information (OSTI)

    Subject: 45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE; 99 MATHEMATICS, COMPUTERS, INFORMATION SCIENCE, MANAGEMENT, LAW, MISCELLANEOUS; STANDARDIZED TERMINOLOGY; ...

  3. defense programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    programs Pantex and Y-12 teams receive NNSA Defense Programs awards NNSA Honors SRS Employees for Excellence Don Zecha, center, representative of the Savannah River Site R&D Assembly Load and Test Team, accepts the Defense Programs Award of Excellence from NNSA-Savannah River Field Office Manager Doug Dearolph, left, and NNSA Acting Deputy Administrator for Defense Programs Brigadier General S.L.... Stewardship Science Academic Alliances Awards 2015 Awards 2012 Awards 2015 NNSA Defense

  4. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  5. Defense Nuclear Facility | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Nuclear Facility NNSA's safety office accredited and recognized for leadership in safe operation of defense nuclear facilities Part of NNSA's commitment to maintaining the nation's safe, secure, and effective nuclear deterrent are relentlessly high standards for technically capable nuclear enterprise personnel qualifications for all aspects of Defense Nuclear Facility operations. In December 2015, the Department of Energy

  6. Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommenda...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations Defense Nuclear Facilities ...

  7. Control Systems Cyber Security:Defense in Depth Strategies

    SciTech Connect (OSTI)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  8. Vulnerability to closing of Hormuz

    SciTech Connect (OSTI)

    Not Available

    1984-03-07

    Tankers carrying roughly 8-million barrels per day (mmb/d) of crude oil, or some 16% of the non-communist world's oil supply, pass through the Strait of Hormuz. Experts agree that just 3-mmb/d of that could be exported through alternate routes. If the war between Iran and Iraq should result in their completely halting each other's production, this relatively limited supply curtailment would reduce world oil production by over 3.4-mmb/d. Since the two have not caused such mutual disaster during four years of war, many observers believe there has been a deliberate avoidance of the jugular squeeze. Nevertheless, the two combatants appear capable not only of cutting off their oil production, but escalating fighting to the point where Gulf traffic would be impeded. Potential results from a prolonged Iran-Iraq crisis are viewed in three scenarios. Also included in this issue are brief summaries of: (1) Mexico's new energy plan, internationalism, and OPEC; (2) update on Argentina's energy resource developments; (3) Venezuela: belt tightening; (4) Western Hemisphere oil production declines; (5) (6) days of oil supply for Canada, USA, Japan, France, Italy, and UK; and (6) US Department of Defense fuel consumption. The Energy Detente fuel price/tax series and principal industrial fuel prices are included for March for countries of the Eastern Hemisphere.

  9. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  10. Fusion Rockets for Planetary Defense

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA UNCLASSIFIED Fusion Rockets for Planetary Defense Glen Wurden Los Alamos National Laboratory PPPL Colloquium March 16, 2016 LA-UR-15-xxxx LA-UR-16-21396 | Los Alamos National Laboratory | Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA UNCLASSIFIED My collaborators on this topic: T. E. Weber 1 , P. J. Turchi 2 , P. B. Parks 3 , T. E. Evans 3 , S. A. Cohen 4 , J. T.

  11. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  12. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  13. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  14. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  15. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  16. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  17. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  18. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  19. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  20. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  1. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Energy Savers [EERE]

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  2. V-094: IBM Multiple Products Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple ...

  3. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  4. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  5. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  6. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  7. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  8. Applicability of existing C3 (command, control and communications) vulnerability and hardness analyses to sentry system issues. Technical report

    SciTech Connect (OSTI)

    Lee, R.C.

    1983-01-13

    This report is a compilation of abstracts resulting from a literature search of reports relevant to Sentry Ballistic missile system C3 vulnerability and hardness. Primary sources consulted were the DOD Nuclear Information Analysis Center (DASIAC) and the Defense Technical Information Center (DTIC). Approximately 175 reports were reviewed and abstracted, including several related to computer programs for estimating nuclear effects on electromagnetic propagation. The reports surveyed were ranked in terms of their importance for Sentry C3 VandH issues.

  9. Dynamic defense workshop : from research to practice.

    SciTech Connect (OSTI)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. Principal Deputy Administrator for Defense Nuclear Nonproliferation...

    National Nuclear Security Administration (NNSA)

    Principal Deputy Administrator for Defense Nuclear Nonproliferation Ken Baker at the 32nd Annual International Meeting on Reduced Enrichment for Research and Test Reactors in ...

  11. NREL: Department of Defense Energy Programs - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    about NREL's work with the U.S. Department of Defense (DOD) on energy projects. ... approaches that can be replicated across DOD and other Federal agencies, setting the ...

  12. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect (OSTI)

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    CCF vulnerability and the suitability of mitigation techniques. Development of an effective CCF taxonomy will help to provide a framework for establishing the objective analysis and assessment capabilities desired to facilitate rigorous identification of fault types and triggers that are the fundamental elements of CCF.

  13. March 23, 1983: Strategic Defense Initiative (SDI) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1983: Strategic Defense Initiative (SDI) March 23, 1983: Strategic Defense Initiative (SDI) March 23, 1983: Strategic Defense Initiative (SDI) March 23, 1983 President Reagan addresses the nation on national security and announces the Strategic Defense Initiative (SDI), a satellite-based defense system that would destroy incoming missiles and warheads in space

  14. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  15. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  16. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  17. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  18. Categorical Exclusion Determinations: NNSA-Defense Science University

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Programs | Department of Energy Defense Science University Programs Categorical Exclusion Determinations: NNSA-Defense Science University Programs Categorical Exclusion Determinations issued by NNSA-Defense Science University Programs. DOCUMENTS AVAILABLE FOR DOWNLOAD No downloads found for this office.

  19. Defense programs beryllium good practice guide

    SciTech Connect (OSTI)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  20. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type

  1. COLLOQUIUM: Fusion Rockets for Planetary Defense | Princeton...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6, 2016, 4:15pm to 5:30pm MBG AUDITORIUM COLLOQUIUM: Fusion Rockets for Planetary Defense Dr. Glen Wurden Los Alamos National Laboratory Contact Information Coordinator(s): Ms....

  2. EM Leaders Earn National Defense Degrees

    Broader source: Energy.gov [DOE]

    WASHINGTON, D.C. – Two EM employees were recently awarded Master of Science degrees from the National Defense University (NDU) as part of a DOE-sponsored professional development program.

  3. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  4. NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 | Department...

    Broader source: Energy.gov (indexed) [DOE]

    An Act to authorize appropriations for fiscal year 2000 for military activities of the Department of Defense, for military construction, and for defense activities of the ...

  5. NREL: Department of Defense Energy Programs - Energy Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NREL's collaboration with the Office of the Secretary of Defense and the military services ... Browse examples of NREL's projects with the Department of Defense across military service ...

  6. Natural Resources Defense Council NRDC | Open Energy Information

    Open Energy Info (EERE)

    Defense Council (NRDC) Place: New York, New York Zip: 10011 Product: Alliance for environmental protection. References: Natural Resources Defense Council (NRDC)1 This...

  7. DOE Defense Nuclear Nonproliferation DNN | Open Energy Information

    Open Energy Info (EERE)

    Defense Nuclear Nonproliferation DNN Jump to: navigation, search Name: DOE Defense Nuclear Nonproliferation (DNN) Place: Washington, Washington, DC Zip: 20585 Product: String...

  8. Defense-in-Depth, How Department of Energy Implements Radiation...

    Energy Savers [EERE]

    Defense-in-Depth, How Department of Energy Implements Radiation Protection in Low Level Waste Disposal Defense-in-Depth, How Department of Energy Implements Radiation Protection in ...

  9. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  10. Indiana Office of Energy Defense Development | Open Energy Information

    Open Energy Info (EERE)

    Energy Defense Development Jump to: navigation, search Name: Indiana Office of Energy & Defense Development Place: Indianapolis, Indiana Zip: 46204 Product: String representation...

  11. Record of Decision; Defense Waste Processing Facility at the...

    Office of Environmental Management (EM)

    Record of Decision; Defense Waste Processing Facility at the Savannah River Site, Aiken, SC AGENCY: Department of Energy, DOE. ACTION: Record of Decision, Defense Waste Processing ...

  12. Don Cook discusses NNSA's Defense Programs at Woodrow Wilson...

    National Nuclear Security Administration (NNSA)

    NNSA's Defense Programs at Woodrow Wilson Center | National Nuclear Security ... Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center Cook at WW Don Cook, ...

  13. Defense, Interior Departments Pursue Renewable Energy on Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense, Interior Departments Pursue Renewable Energy on Federal Lands Defense, Interior Departments Pursue Renewable Energy on Federal Lands August 8, 2012 - 1:22pm Addthis Solar...

  14. EM's Defense Waste Processing Facility Achieves Waste Cleanup...

    Office of Environmental Management (EM)

    Defense Waste Processing Facility Achieves Waste Cleanup Milestone EM's Defense Waste Processing Facility Achieves Waste Cleanup Milestone January 14, 2016 - 12:10pm Addthis The ...

  15. Defense Programs | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Programs Defense Programs One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA, through its Office of Defense Programs, ensures that the U.S. nuclear arsenal meets the country's national security requirements and continues to serve its essential deterrence role. One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA,

  16. department of defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense DOD/DOE NNSA Joint Munitions Program: 30 years of collaborative innovation As part of NNSA's commitment to protecting and preserving the nation's nuclear deterrent, NNSA collaborates with the Department of Defense (DOD) in the Joint Munitions Program (JMP). This year marks more than 30 years of partnership through the JMP to improve and invest in innovative... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On March 21 through

  17. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system

  18. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  19. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  20. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  1. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  2. Control Systems Cyber Security: Defense-in-Depth Strategies

    SciTech Connect (OSTI)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  3. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  4. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  5. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  6. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  7. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. Vulnerability Analysis of Energy Delivery Control Systems (September 2011) (2.69 MB)

  8. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  9. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  10. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  11. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  12. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  13. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  14. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  15. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  16. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. Guide to Critical Infrastructure Protection

  17. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  18. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  19. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  20. NA 10 - Deputy Administrator for Defense Programs | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) 0 - Deputy Administrator for Defense Programs

  1. NA 20 - Deputy Administrator for Defense Nuclear Nonproliferation |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | (NNSA) 20 - Deputy Administrator for Defense Nuclear Nonproliferation

  2. NA 70 - Associate Administrator for Defense Nuclear Security | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration | (NNSA) 70 - Associate Administrator for Defense Nuclear Security

  3. Managing America's Defense Nuclear Waste | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste (1.1 MB) More Documents & Publications Reorganization of the Office of Energy Efficiency and Renewable Energy: Preliminary Observations National Defense Authorization Act for Fiscal Year 2005, Information Request, Mission & Functions Statement for the Office of Environmental Management

  4. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  5. Department of Defense Nuclear/Biological/Chemical (NBC) defense: Annual report to Congress. Annual report

    SciTech Connect (OSTI)

    1997-03-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703 (50 USC 1522), mandates the consolidation of all Department of Defense chemical and biological (CB) defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a nuclear, biological and chemical (NBC) contaminated environment. This report contains modernization plan summaries that highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program. 50 USC 1522 has been a critical tool for ensuring the elimination of redundant programs, focusing funds on program priorities, and enhancing readiness. While many problems remain in consolidating the NBC defense program, significant and measurable progress has been made in fulfilling the letter and the intent of Congress. There has been a consolidation of the research, development and acquisition organizations for NBC defense, including the consolidation of all research, development, test and evaluation, and procurement funds for NBC defense. There has been significant progress in the development of Joint training, doctrine development, and requirements generation. Modernization and technology plans have been developed that will begin to show real savings and true consolidation of efforts among the Services. The fruits of these plans will be realized over the next few years as the public law has time to take effect and will result in the increased readiness of U.S. forces. The objective of the Department of Defense (DoD) NBC defense program is to enable our forces to survive, fight, and win in NBC warfare environments. Numerous rapidly changing factors continually influence the program and its management.

  6. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    SciTech Connect (OSTI)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  7. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  8. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  9. Protection Programming Defensive Planning for Fixed Facilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 DOE STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE STD-1207-2012 This Page Intentionally Left Blank ii DOE STD-1207-2012 TABLE OF CONTENTS

  10. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  11. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  12. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  13. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  14. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. Top 10 Vulnerabilities of

  15. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  16. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  17. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED

  18. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  19. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  1. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  2. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  3. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material...

    National Nuclear Security Administration (NNSA)

    GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials ...

  4. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  5. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks (425.98 KB) More Documents & Publications Cyber Assessment Methods for SCADA Security Introduction SCADA ...

  6. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Introduction SCADA Security for Managers and Operators DOE National SCADA Test Bed Program ...

  7. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems

  8. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  9. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  10. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  11. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  12. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  13. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  14. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    on both onsite and offsite tribally owned and non-tribally owned energy infrastructure. ... Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  15. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  16. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  17. Costs of strikes between vulnerable missile forces

    SciTech Connect (OSTI)

    Canavan, G.H.

    1997-02-01

    This note derives the first and second strike magnitudes and costs for strikes between vulnerable missile forces with multiple warheads. The extension to mixes with invulnerable missiles is performed in a companion note. Stability increases as the number of weapons per missile is reduced. The optimal allocation of weapons between missiles and value is significant in predicting the stability impact of the reduction of the number of weapons per missile at large numbers of missiles, less significant in reducing the number of missiles for fixed weapons per missile. At low numbers of missiles, the stability indices for singlet and triplet configurations are comparable, as are the number of weapons each would deliver on value targets.

  18. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  19. The Defense Logistics Agency, Hydrogen-Powered Forklift Test...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli ...

  20. Their best defense is good fiscal sense (Daily Press) | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    https:www.jlab.orgnewsarticlestheir-best-defense-good-fiscal-sense-daily-press Their best defense is good fiscal sense Top Guard Security finds it can be a good idea to say,...

  1. The Office of Environmental Management (EM) Defense Environmental...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (EM) Defense Environmental Cleanup The Office of Environmental Management (EM) Defense ... Above on the left is K-25, at Oak Ridge before and after the 844,000 sq-ft demolition. ...

  2. Defense Nuclear Nonproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Nuclear Nonproliferation NNSA Announces Elimination of Highly Enriched Uranium (HEU) from Indonesia All of Southeast Asia Now HEU-Free (WASHINGTON, D.C.) - The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA), Indonesian Nuclear Industry, LLC (PT INUKI), the National Nuclear Energy Agency (BATAN), and the Nuclear Energy Regulatory Agency (BAPETEN) of the... NNSA program strengthens national security from afar The Nuclear Smuggling Detection and Deterrence

  3. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  4. planetary defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    planetary defense NNSA innovation fuels space exploration Today, in accordance with a 1971 Presidential proclamation, the United States commemorates the first human setting foot on the moon. As a science agency, NNSA's technology and development have given rise to extraterrestrial innovation and enabled other-worldly achievements. From... NNSA lab explores options to save Earth from asteroid impact The threat of potential earth impacts from space objects has been on scientists' and policymakers'

  5. NAP-XX Defense Programs Business Requirements and Processes Manual

    National Nuclear Security Administration (NNSA)

    Programs http://nnsa.energy.gov printed copies are uncontrolled SUPPLEMENTAL DIRECTIVE Approved: 2-25-16 DEFENSE PROGRAMS BUSINESS PROCESS SYSTEM (DPBPS) NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Programs NNSA SD 452.3-1A THIS PAGE INTENTIONALLY LEFT BLANK NNSA SD 452.3-1A 1 2-25-16 DEFENSE PROGRAMS BUSINESS PROCESS SYSTEM 1. PURPOSE. This supplemental directive (SD) establishes the Defense Programs Business Process System (DPBPS) Portal as the mechanism for implementing DOE

  6. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments Programs Defense Systems & Assessments Accelerating Innovation for the Warfighter Accelerating Innovation into the Hands of the Warfighter Supporting Ballistic Missile Defense Supporting Ballistic Missile Defense Launching GPS Satellites Launch of GPS satellite About Defense Systems & Assessments Our engineering, science, and technology expertise supports soldiers on the battlefield. About Us Program Areas Our multi-faceted research detects and defends against threats

  7. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  8. National Defense Authorization Act for Fiscal Year 2000 § 3164:

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Whistleblower Protection Program | Department of Energy National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the Department Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered

  9. 2011 Annual Planning Summary for Defense Nuclear Nonproliferation (NA-20)

    Broader source: Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within Defense Nuclear Nonproliferation (NA-20).

  10. Available 45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE...

    Office of Scientific and Technical Information (OSTI)

    NATIONAL DEFENSE; CHEMICAL EXPLOSIONS; SHOCK WAVES; INDUSTRIAL PLANTS; ACCIDENTS; SAFETY; MECHANICAL STRUCTURES; BLAST EFFECTS; DYNAMIC LOADS; BUILDINGS; CHEMICAL EXPLOSIVES;...

  11. Rock mechanics contributions from defense programs

    SciTech Connect (OSTI)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth`s interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges.

  12. Defense Programs Science Council | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Programs Science Council 2015 NNSA Defense Programs Science Council The 2015 NNSA Defense Programs Science Council, comprising representatives from each of the three NNSA national security laboratories and one person representing the production sites, is now fully staffed.The Science Council was re-established in 2010 by Dr. Don Cook, Deputy Administrator of

  13. Listing of Defense Nuclear Facilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Listing of Defense Nuclear Facilities Listing of Defense Nuclear Facilities Attachment 1 - Listing of Defense Nuclear Facilities (55.77 KB) More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Workforce Restructuring Policy The First Five Years FY 2004-2008

  14. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  15. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  16. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  17. Toward a defense-dominated world

    SciTech Connect (OSTI)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  18. Department of Defense Nuclear/Biological/Chemical (NBC) warfare defense, annual report to Congress. Final report FY96

    SciTech Connect (OSTI)

    1996-04-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703, mandates the consolidation of all Department of Defense chemical and biological defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a chemically or biologically contaminated environment. This report contains modernizations plan summaries which highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program.

  19. NREL: Department of Defense Energy Programs - Webmaster

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Webmaster Please enter your name and e-mail address in the boxes provided, then type your message below. When you are finished, click "Send Message." NOTE: If you enter your e-mail address incorrectly, we will be unable to reply. Your name: Your email address: Your message: Send Message Printable Version Department of Defense Energy Programs Home Projects Publications News Contact Us Did you find what you needed? Yes 1 No 0 Thank you for your feedback. Would you like to take a moment

  20. National Missile Defense: What, When, and Why?

    SciTech Connect (OSTI)

    Garwin, Richard L.

    2001-12-05

    The Bush Administration is steaming ahead with the deployment of the Clinton-designed mid-course hit-to-kill intercept system for national missile defense. This has serious disabilities against even the simplest strategic ballistic missiles. What is the threat to the United States from such missiles, in context? Is NMD a rational response, considering the always limited resources of the U.S. government? What are the other threats and needs? If protection is demanded against potential emerging missile states, what are the options? Answers to these questions will be provided in the talk and some are already available at the author's web site: http://www.fas.org/rlg.

  1. Protection Program Defensive Planning for Fixed Facilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 ──────────────── CHANGE NOTICE NO.1 SEPTEMBER 2015 DOE STD-1207-2012 This Page Intentionally Left Blank DOE STD-1207-2012 i ATTACHMENT 1 Change Notice No. 1 DOE STD-1207-2012 September 2015 Protection

  2. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Identify Department vulnerabilities in design, construction and operations to allow the Secretary to address issues before they become major problems. Review and evaluate the ...

  3. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  4. U-191: Oracle Java Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes

  5. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  6. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  7. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  8. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  9. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

  10. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  11. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  12. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  13. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  14. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  15. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE)

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  16. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  17. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  18. The Office of Environmental Management Non-Defense Environmental Cleanup |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Non-Defense Environmental Cleanup The Office of Environmental Management Non-Defense Environmental Cleanup Microsoft Word - 8E2A4440.doc (100.45 KB) More Documents & Publications Microsoft Word - PSRP Updates 6-25-10_v2 The Office of Environmental Management (EM) Defense Environmental Cleanup The Office of Environmental Management Uranium Enrichment D&D

  19. Title III of the Defense Production Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Title III of the Defense Production Act Title III of the Defense Production Act Matthew Seaford presentation on Title III of the Defense Production Act at the Industry Roundtable. 2_seaford_roundtable.pdf (1.21 MB) More Documents & Publications A National Strategic Plan For Advanced Manufacturing Market Drivers for Biofuels Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

  20. Defense Programs lecture series continue | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Defense Programs lecture series continue Thursday, March 13, 2014 - 4:00pm Elaine Bunn, Deputy Assistant Secretary of Defense for Nuclear and Missile Defense Policy (DASD/NMD), today spoke at NNSA about her experiences across the nuclear enterprise. The talk was part of ongoing lectures hosted by Brig. Gen. James C. Dawkins, NNSA Principal Assistant Deputy Administrator for Military Application. Today's talk was co-hosted by Project on Nuclear Issues (PONI). Bunn

  1. NNSA's Defense Nuclear Nonproliferation leaders gather in nation's

    National Nuclear Security Administration (NNSA)

    capital | National Nuclear Security Administration | (NNSA) NNSA's Defense Nuclear Nonproliferation leaders gather in nation's capital Wednesday, June 8, 2016 - 9:38am NNSA's Defense Nuclear Nonproliferation Science Council met at NNSA headquarters in Washington. Recently, the NNSA held the fourth meeting of the Office of Defense Nuclear Nonproliferation Science Council in Washington, DC. The Science Council provides a way for senior-level leadership from NNSA headquarters and the labs,

  2. 2015 NNSA Defense Programs Science Council | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) 2015 NNSA Defense Programs Science Council Friday, May 15, 2015 - 12:30pm 2015 NNSA Science Council The 2015 NNSA Defense Programs Science Council, comprising representatives from each of the three NNSA national security laboratories and one person representing the production sites, is now fully staffed. The Science Council was re-established in 2010 by Dr. Don Cook, Deputy Administrator of Defense Programs, to investigate and explore cross-cutting science, technology

  3. Defense Secretary Chuck Hagel visits Sandia | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Defense Secretary Chuck Hagel visits Sandia Thursday, January 9, 2014 - 3:21pm Defense Secretary Chuck Hagel visited the Z Pulsed Power Facility at Sandia National Laboratories in Albuquerque, N.M., yesterday. The tour was part of a broader visit to the national laboratory and Kirtland Air Force Base. While at Sandia, Secretary Hagel was provided with briefings and tours of several of the unique capabilities at the laboratory used to assist the Department of Defense

  4. Cyber Defense Competition draws students to Argonne | Argonne National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratory Members of the team from Lewis University work to defend their virtual grid system from attack at the first annual Argonne Collegiate Cyber Defense Competition. Members of the team from Lewis University work to defend their virtual grid system from attack at the first annual Argonne Collegiate Cyber Defense Competition. Cyber Defense Competition draws students to Argonne By Greg Cunningham * April 26, 2016 Tweet EmailPrint More than 75 aspiring cyber defenders from across Illinois

  5. Defense-Related Uranium Mines Report to Congress (August 2014) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Defense-Related Uranium Mines Report to Congress (August 2014) Defense-Related Uranium Mines Report to Congress (August 2014) Section 3151 of the National Defense Authorization Act for Fiscal Year 2013 directed the Secretary of Energy, in consultation with the Secretary of the Interior and the Administrator of the U.S. Environmental Protection Agency (EPA), to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided

  6. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  7. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  8. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  9. Second Line of Defense Spares Program Assessment

    SciTech Connect (OSTI)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  10. History of Hanford Site Defense Production (Brief)

    SciTech Connect (OSTI)

    GERBER, M S

    2001-02-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

  11. National Missile Defense: What, When and Why?

    SciTech Connect (OSTI)

    Garwin, Richard L

    2009-12-05

    The Bush Administration is steaming ahead with the deployment of the Clinton-designed mid-course hit-to-kill intercept system for national missile defense. This has serious disabilities against even the simplest strategic ballistic missiles. What is the threat to the United States from such missiles, in context? Is NMD a rational response, considering the always limited resources of the U.S. government? What are the other threats and needs? If protection is demanded against potential emerging missile states, what are the options? Answers to these questions will be provided in the talk and some are already available at the author’s web site: http://www.fas.org/rlg.

  12. Most Viewed Documents - National Defense | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    National Defense 2012 Monitoring Research Review: Ground-Based Nuclear Explosion ... Paddock, R.A. (1997) The Effects of Nuclear Weapons Glasstone, Samuel (1964) ...

  13. June 2014 Most Viewed Documents for National Defense | OSTI,...

    Office of Scientific and Technical Information (OSTI)

    June 2014 Most Viewed Documents for National Defense The Effects of Nuclear Weapons ... Vigil, M.G. (1996) 13 Ground-based Nuclear Detonation Detection (GNDD) Technology ...

  14. March 2014 Most Viewed Documents for National Defense | OSTI...

    Office of Scientific and Technical Information (OSTI)

    March 2014 Most Viewed Documents for National Defense The Effects of Nuclear Weapons ... States) (1995) 13 The history of nuclear weapon safety devices Plummer, D.W.; ...

  15. Energy and Defense Departments Announce Agreement to Enhance...

    Energy Savers [EERE]

    Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and ...

  16. Microsoft Word - Defense Science Quarterly 05-08.doc

    National Nuclear Security Administration (NNSA)

    ... Page 4 Office of Defense Science May 2008 * Plasma Material Properties - Opacity is the ... This includes making plasma states with temperatures exceeding those of fusion plasmas ...

  17. Col. Kabban receives NNSA Defense Programs Excellence Award ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Excellence Award Col. Kabban receives NNSA Defense Programs Excellence Award Brig. Gen. Jim Dawkins, NNSA's Principal Assistant Deputy Administrator for Military Application,...

  18. Shear Rolling of Magnesium Sheet for Automotive, Defense, and...

    Office of Scientific and Technical Information (OSTI)

    Shear Rolling of Magnesium Sheet for Automotive, Defense, and Energy Applications Citation ... Visit OSTI to utilize additional information resources in energy science and technology. A ...

  19. Shear Rolling of Magnesium Sheet for Automotive, Defense, and...

    Office of Scientific and Technical Information (OSTI)

    Title: Shear Rolling of Magnesium Sheet for Automotive, Defense, and Energy Applications Authors: Muralidharan, Govindarajan 1 ; Muth, Thomas R 1 ; Peter, William H 1 ; ...

  20. Renewable Energy and Defense Geospatial Database | Open Energy...

    Open Energy Info (EERE)

    Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Renewable Energy and Defense Geospatial Database Abstract This database provides GIS data...

  1. National Defense Authorization Act for Fiscal Year 2005, Information...

    Broader source: Energy.gov (indexed) [DOE]

    Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition20082009EMAdditionalMaterialMACopy.pdf PUBLIC LAW ...

  2. Departments of Energy, Defense Partner to Install Fuel Cell Backup...

    Energy Savers [EERE]

    Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military ... The primary challenge facing currently available fuel cells is the higher first cost ...

  3. NNSA Defense Programs Announces Quarterly Awards | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) Defense Programs Announces Quarterly Awards February 16, 2011 Microsoft Office document icon NR-02-16.doc

  4. Energy Department to Loan Emergency Fuel to Department of Defense...

    Energy Savers [EERE]

    Home Heating Oil Reserve. The Defense Logistics Agency (DLA) will begin drawing down stocks from the heating oil reserve terminal in Groton, Connecticut as early as tomorrow. ...

  5. National Defense Authorization Act for Fiscal Year 2005, Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Request, | Department of Energy National Defense Authorization Act for Fiscal Year 2005, Information Request, National Defense Authorization Act for Fiscal Year 2005, Information Request, Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition_2008_2009_EM_Additional_Material_MA_Copy.pdf PUBLIC LAW 108-375-OCT. 28, 2004 118 STAT. 1811 Public Law 108-375, 108th Congress National Defense Authorization Act for Fiscal

  6. Bottoms Up. [report on the Defense Department] (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    Title: Bottoms Up. report on the Defense Department The open quotesBottoms Up ... Country of Publication: United States Language: English Subject: 45 MILITARY TECHNOLOGY, ...

  7. Comments of the Natural Resource Defense Council on DOE's Request...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    on Reducing Regulatory Burden Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden On behalf of the Natural ...

  8. second line of defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    second line of defense Proliferation Detection The Office of Proliferation Detection (PD) develops capabilities to detect special nuclear materials and weapons production and ...

  9. Comments of the Natural Resource Defense Council on Energy Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    on Energy Efficiency and Sustainable Design Standards for New Federal Buildings, 75 Fed. ... Comments of the Natural Resource Defense Council on Energy Efficiency and Sustainable ...

  10. Y-12 Successfully Meets and Exceeds Defense Programs Goals During...

    National Nuclear Security Administration (NNSA)

    Blog Home Field Offices Welcome to the NNSA Production Office NPO News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and...