National Library of Energy BETA

Sample records for vulnerability identification defense

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  4. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  5. defense

    National Nuclear Security Administration (NNSA)

    >Madelyn Creedon, Assistant Secretary for Global Strategic Affairs
    Andrew Weber, Assistant Secretary of Defense for Nuclear, Chemical & Biological Defense...

  6. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  7. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  8. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  9. U-141: Sourcefire Defense Center Bugs

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system.

  10. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  11. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  12. Defense Gallery

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gallery Defense Gallery Exhibits in this gallery capture Laboratory's activities to fulfill its central mission to ensure the safety, security, and reliability of the U.S. nuclear deterrent while reducing the global threat of nuclear, chemical, and biological weapons. August 18, 2014 museum plan showing the defense gallery Laboratory provides the necessary expertise and technology developed here to help the nation respond effectively to significant threats of broad scope and to help make the

  13. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  14. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  15. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  16. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  17. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  18. Defense Programs Science Council | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Programs Science Council

  19. Defense Threat Reduction Agency | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Threat Reduction Agency

  20. second line of defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    second line of defense

  1. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  2. Defense Nuclear Facility Safety Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2014 Defense Nuclear Facility Safety Board Defense Nuclear Facility Safety Board (DNSFB) Vice Chairwoman Jesse Roberson visited and toured the WIPP site this week. While...

  3. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material May 29, 2014 GTRI's Remove Program works around the world to remove excess nuclear and radiological materials that could be used for a nuclear weapon or radiological dispersal device (RDD), or "dirty bomb". Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify,

  4. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  5. Defense on the Move: Ant-Based Cyber Defense

    SciTech Connect (OSTI)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  6. Regional Climate Vulnerabilities and Resilience Solutions | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please ...

  7. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  8. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  9. defense | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense Admiral Haney visits New Mexico labs Admiral Cecil D. Haney, Commander of USSTRATCOM, recently visited Los Alamos and Sandia national laboratories. Admiral Haney and Lab Director Charlie McMillan stand in front of the Army-Navy E (as in excellence) Flag awarded to the Lab at the end of World War II. At Sandia, Admiral Haney met with... Defense Secretary Chuck Hagel visits Sandia Defense Secretary Chuck Hagel visited the Z Pulsed Power Facility at Sandia National Laboratories in

  10. NNSA and Defense Nuclear Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Defense Nuclear Facilities Safety Board certifications free up 47 million in previously allocated funding October 2, 2009 Los Alamos, New Mexico, Oct. 2, 2009 - The Chemistry...

  11. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  12. SECURITY MODELING FOR MARITIME PORT DEFENSE RESOURCE ALLOCATION

    SciTech Connect (OSTI)

    Harris, S.; Dunn, D.

    2010-09-07

    Redeployment of existing law enforcement resources and optimal use of geographic terrain are examined for countering the threat of a maritime based small-vessel radiological or nuclear attack. The evaluation was based on modeling conducted by the Savannah River National Laboratory that involved the development of options for defensive resource allocation that can reduce the risk of a maritime based radiological or nuclear threat. A diverse range of potential attack scenarios has been assessed. As a result of identifying vulnerable pathways, effective countermeasures can be deployed using current resources. The modeling involved the use of the Automated Vulnerability Evaluation for Risks of Terrorism (AVERT{reg_sign}) software to conduct computer based simulation modeling. The models provided estimates for the probability of encountering an adversary based on allocated resources including response boats, patrol boats and helicopters over various environmental conditions including day, night, rough seas and various traffic flow rates.

  13. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  14. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  15. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  16. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  17. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  18. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  19. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  20. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  1. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  2. United States Department of Defense | Open Energy Information

    Open Energy Info (EERE)

    Defense Jump to: navigation, search Logo: United States Department of Defense Name: United States Department of Defense Address: 1000 Defense Pentagon Place: Washington, District...

  3. Environmental Defense Fund | Open Energy Information

    Open Energy Info (EERE)

    Defense is dedicated to protecting the environmental rights of all people, including future generations. References: Environmental Defense Fund1 This article is a stub. You can...

  4. OFFICE OF THE UNDER SECRETARY OF DEFENSE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301 -3000 ACQUISITION TECHNOLOGY AND LOGISTICS MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND...

  5. Independent Activity Report, Defense Nuclear Facilities Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

  6. Listing of Defense Nuclear Facilities

    Energy Savers [EERE]

    Listing of Defense Nuclear Facilities The facilities listed below are considered DOE defense nuclear facilities for purposes of Section 3161. Kansas City Plant Pinellas Plant Mound Facility Fernald Environmental Management Project Site Pantex Plant Rocky Flats Environmental Technology Site, including the Oxnard Facility Savannah River Site Los Alamos National Laboratory Sandia National Laboratory Lawrence Livermore National Laboratory Oak Ridge National Laboratory Nevada Test Site 1 Y-12 Plant

  7. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  8. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    SciTech Connect (OSTI)

    Moss, R. H.; Delgado, A.; Malone, E L.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.

  9. Defense against common mode failures in protection system design

    SciTech Connect (OSTI)

    Wyman, R.H.; Johnson, G.L.

    1997-08-27

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ``fact-of-life`` in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D&D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D&D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ``defense-in-depth and diversity analysis`` has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided.

  10. National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) National Defense Authorization Act for Fiscal Year 1993 (PL 102-484) Section 3162 of the National Defense Authorization Act for Fiscal Year 1993 (Public Law 102-484) called for the Secretary to establish and carry out a program for the identification and on-going medical evaluation of its former employees who are subject to significant health risks as a result of the exposure of such employees to

  11. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... However, regional variation does not imply regional ... Federal, state, and local governments and the ... climate-resilient, assessment of vulnerabilities in ...

  12. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. ...

  13. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  14. Vulnerability Analysis of Energy Delivery Control Systems

    Energy Savers [EERE]

    ... products alike, and the introduction of Web applications into SCADA systems has created ... vulnerabilities Most likely attack vector Web Human-Machine Interface (HMI) ...

  15. Proliferation Vulnerability Red Team report

    SciTech Connect (OSTI)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E.

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  16. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  17. 5th Defense Renewable Energy Summit

    Broader source: Energy.gov [DOE]

    The 5th Defense Renewable Energy Summit brings together U.S. Department of Defense (DOD) and military decision-makers with renewable energy developers, utilities, and leading financiers to...

  18. Recommended Practice: Defense-in-Depth

    Energy Savers [EERE]

    External Report # INL/EXT-06-11478 Control Systems Cyber Security: Defense in Depth Strategies May 2006 Prepared by Idaho National Laboratory Recommended Best Practice: Defense in Depth 2 Table of Contents Keywords............................................................................................................................. 3 Introduction......................................................................................................................... 3 Background

  19. Homeland Security and Defense Applications

    ScienceCinema (OSTI)

    None

    2015-01-09

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  20. Office of Defense Nuclear Nonproliferation

    Energy Savers [EERE]

    Nuclear Security Administration Office of Defense Nuclear Nonproliferation Overview of Nuclear Nonproliferation Programs: What Hasn't Changed, What Has Changed, and What Might Benefit from Change December 3, 2013 Briefing Outline * Organizational Context  DNN Vision, Mission and Competencies  Organization  Global Reach  Partners  Prioritization Methodology * DNN Programs - Opportunities and Challenges  GTRI, R&D, NIS, IMPC, FMD * Looking Ahead: Over the Horizon (OTH) and

  1. Defense Secretary Chuck Hagel visits Sandia | National Nuclear...

    National Nuclear Security Administration (NNSA)

    Global Strategic Affairs Andrew Weber, Assistant Secretary of Defense for Nuclear, Chemical & Biological Defense Programs Defense Secretary Chuck Hagel visits Sandia Related ...

  2. Vulnerability to closing of Hormuz

    SciTech Connect (OSTI)

    Not Available

    1984-03-07

    Tankers carrying roughly 8-million barrels per day (mmb/d) of crude oil, or some 16% of the non-communist world's oil supply, pass through the Strait of Hormuz. Experts agree that just 3-mmb/d of that could be exported through alternate routes. If the war between Iran and Iraq should result in their completely halting each other's production, this relatively limited supply curtailment would reduce world oil production by over 3.4-mmb/d. Since the two have not caused such mutual disaster during four years of war, many observers believe there has been a deliberate avoidance of the jugular squeeze. Nevertheless, the two combatants appear capable not only of cutting off their oil production, but escalating fighting to the point where Gulf traffic would be impeded. Potential results from a prolonged Iran-Iraq crisis are viewed in three scenarios. Also included in this issue are brief summaries of: (1) Mexico's new energy plan, internationalism, and OPEC; (2) update on Argentina's energy resource developments; (3) Venezuela: belt tightening; (4) Western Hemisphere oil production declines; (5) (6) days of oil supply for Canada, USA, Japan, France, Italy, and UK; and (6) US Department of Defense fuel consumption. The Energy Detente fuel price/tax series and principal industrial fuel prices are included for March for countries of the Eastern Hemisphere.

  3. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  4. Fusion Rockets for Planetary Defense

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA UNCLASSIFIED Fusion Rockets for Planetary Defense Glen Wurden Los Alamos National Laboratory PPPL Colloquium March 16, 2016 LA-UR-15-xxxx LA-UR-16-21396 | Los Alamos National Laboratory | Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA UNCLASSIFIED My collaborators on this topic: T. E. Weber 1 , P. J. Turchi 2 , P. B. Parks 3 , T. E. Evans 3 , S. A. Cohen 4 , J. T.

  5. NA 10 - Deputy Administrator for Defense Programs | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration 0 - Deputy Administrator for Defense Programs

  6. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  7. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  8. Potential Vulnerability of US Petroleum Refineries to Increasing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature andor Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to ...

  9. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  10. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  11. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  12. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  13. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  14. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities The objective of safeguards is the timely detection of ...

  15. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  16. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  17. Nuclear Fuel Cycle & Vulnerabilities (Technical Report) | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: Nuclear Fuel Cycle & Vulnerabilities Citation Details In-Document Search Title: Nuclear Fuel Cycle & Vulnerabilities You are accessing a document from the ...

  18. U-035: Adobe Flash Player Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. Impact: Multiple vulnerabilities have been reported in Adobe ...

  19. Vulnerability Analysis of Energy Delivery Control Systems (September...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared ...

  20. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document ...

  1. Mitigations for Security Vulnerabilities Found in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need ...

  2. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by ...

  3. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides ...

  4. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  5. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  6. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  7. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  8. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  9. Natural Resources Defense Council | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Council Natural Resources Defense Council Comments of the Natural Resource Defense Council on The Department of Energy's Executive Order 13563 Preliminary Plan Submitted on August 1, 2011 PDF icon Comments_of_ the_NRDC.pdf More Documents & Publications Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden DOE Preliminary Plan for Retrospective Analysis of Existing Rules DOE_05_18_2011.pdf

  10. Defense Nuclear Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is charged with

  11. defense programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Savannah River Site R&D Assembly Load and Test Team, accepts the Defense Programs Award ... Don Cook, Deputy Administrator of... Research, Development, Test, and Evaluation The ...

  12. Dynamic defense workshop : from research to practice.

    SciTech Connect (OSTI)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  13. COLLOQUIUM: Fusion Rockets for Planetary Defense | Princeton...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MBG AUDITORIUM COLLOQUIUM: Fusion Rockets for Planetary Defense Dr. Glen Wurden Los Alamos National Laboratory Fusion rocket engines could enable a rapid response capability for ...

  14. Natural Resources Defense Council Ex Parte Communication

    Broader source: Energy.gov [DOE]

    On Tuesday, November 18, 2014, a representative of the Natural Resources Defense Council held a conference call with representatives of the Department of Energy, the Environmental Protection Agency...

  15. Taxonomy for Common-Cause Failure Vulnerability and Mitigation

    SciTech Connect (OSTI)

    Wood, Richard Thomas; Korsah, Kofi; Mullens, James Allen; Pullum, Laura L.

    2015-09-01

    Applying current guidance and practices for common-cause failure (CCF) mitigation to digital instrumentation and control (I&C) systems has proven problematic, and the regulatory environment has been unpredictable. The potential for CCF vulnerability inhibits I&C modernization, thereby challenging the long-term sustainability of existing plants. For new plants and advanced reactor concepts, concern about CCF vulnerability in highly integrated digital I&C systems imposes a design burden that results in higher costs and increased complexity. The regulatory uncertainty in determining which mitigation strategies will be acceptable (e.g., what diversity is needed and how much is sufficient) drives designers to adopt complicated, costly solutions devised for existing plants. To address the conditions that constrain the transition to digital I&C technology by the US nuclear industry, crosscutting research is needed to resolve uncertainty, demonstrate necessary characteristics, and establish an objective basis for qualification of digital technology for nuclear power plant (NPP) I&C applications. To fulfill this research need, Oak Ridge National Laboratory is investigating mitigation of CCF vulnerability for nuclear-qualified applications. The outcome of this research is expected to contribute to a fundamentally sound, comprehensive basis to qualify digital technology for nuclear power applications. This report documents the development of a CCF taxonomy. The basis for the CCF taxonomy was generated by determining consistent terminology and establishing a classification approach. The terminology is based on definitions from standards, guides, and relevant nuclear power industry technical reports. The classification approach is derived from identified classification schemes focused on I&C systems and key characteristics, including failure modes. The CCF taxonomy provides the basis for a systematic organization of key systems aspects relevant to analyzing the potential for CCF vulnerability and the suitability of mitigation techniques. Development of an effective CCF taxonomy will help to provide a framework for establishing the objective analysis and assessment capabilities desired to facilitate rigorous identification of fault types and triggers that are the fundamental elements of CCF.

  16. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  17. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  18. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  19. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  20. Water vulnerabilities for existing coal-fired power plants.

    SciTech Connect (OSTI)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considered subject to demand concerns, supply concerns, or both demand and supply concerns.

  1. Categorical Exclusion Determinations: NNSA-Defense Science University

    Energy Savers [EERE]

    Programs | Department of Energy Defense Science University Programs Categorical Exclusion Determinations: NNSA-Defense Science University Programs Categorical Exclusion Determinations issued by NNSA-Defense Science University Programs. DOCUMENTS AVAILABLE FOR DOWNLOAD No downloads found for this office.

  2. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  3. Defense programs beryllium good practice guide

    SciTech Connect (OSTI)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to generate dusts, mists, fumes, or small particulates. A beryllium exposure control program should minimize airborne concentrations, the potential for and spread of contamination, the number of times individuals are exposed to beryllium, and the number of employees who may be potentially exposed.

  4. COLLOQUIUM: Fusion Rockets for Planetary Defense | Princeton...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6, 2016, 4:15pm to 5:30pm MBG AUDITORIUM COLLOQUIUM: Fusion Rockets for Planetary Defense Dr. Glen Wurden Los Alamos National Laboratory Contact Information Coordinator(s): Ms....

  5. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  6. March 23, 1983: Strategic Defense Initiative (SDI) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    March 23, 1983 President Reagan addresses the nation on national security and announces the Strategic Defense Initiative (SDI), a satellite-based defense system that would destroy ...

  7. Indiana Office of Energy Defense Development | Open Energy Information

    Open Energy Info (EERE)

    Energy Defense Development Jump to: navigation, search Name: Indiana Office of Energy & Defense Development Place: Indianapolis, Indiana Zip: 46204 Product: String representation...

  8. Listing of Defense Nuclear Facilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Listing of Defense Nuclear Facilities PDF icon Attachment 1 - Listing of Defense Nuclear Facilities More Documents & Publications Draft Policy and Planning Guidance for Community ...

  9. National Defense Authorization Act for Fiscal Year 2000 § 3164...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Defense Authorization Act for Fiscal Year 2000 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the ...

  10. Don Cook discusses NNSA's Defense Programs at Woodrow Wilson...

    National Nuclear Security Administration (NNSA)

    NNSA's Defense Programs at Woodrow Wilson Center | National Nuclear Security ... Don Cook discusses NNSA's Defense Programs at Woodrow Wilson Center Cook at WW Don Cook, ...

  11. NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000 An Act to authorize appropriations for fiscal year 2000 for military ...

  12. Natural Resources Defense Council NRDC | Open Energy Information

    Open Energy Info (EERE)

    Defense Council (NRDC) Place: New York, New York Zip: 10011 Product: Alliance for environmental protection. References: Natural Resources Defense Council (NRDC)1 This...

  13. DOE Defense Nuclear Nonproliferation DNN | Open Energy Information

    Open Energy Info (EERE)

    Defense Nuclear Nonproliferation DNN Jump to: navigation, search Name: DOE Defense Nuclear Nonproliferation (DNN) Place: Washington, Washington, DC Zip: 20585 Product: String...

  14. Defense, Interior Departments Pursue Renewable Energy on Federal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense, Interior Departments Pursue Renewable Energy on Federal Lands Defense, Interior Departments Pursue Renewable Energy on Federal Lands August 8, 2012 - 1:22pm Addthis Solar...

  15. EM's Defense Waste Processing Facility Achieves Waste Cleanup...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Waste Processing Facility Achieves Waste Cleanup Milestone EM's Defense Waste Processing Facility Achieves Waste Cleanup Milestone January 14, 2016 - 12:10pm Addthis The ...

  16. Control Systems Cyber Security: Defense in Depth Strategies ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security: Defense in Depth Strategies Control Systems Cyber Security: Defense in ... strategies for organizations that use control system networks while maintaining a ...

  17. Defense Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Programs Defense Programs One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA, through its Office of Defense Programs, ensures that the U.S. nuclear arsenal meets the country's national security requirements and continues to serve its essential deterrence role. One of the primary missions of NNSA is to maintain and enhance the safety, security and reliability of the U.S. nuclear weapons stockpile. NNSA,

  18. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  19. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  20. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  1. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  2. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  3. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  4. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  5. U-198: IBM Lotus Expeditor Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: IBM Lotus Expeditor Multiple Vulnerabilities U-198: IBM Lotus Expeditor Multiple Vulnerabilities June 25, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus Expeditor. PLATFORM: IBM Lotus Expeditor 6.x ABSTRACT: The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.. Reference Links: Vendor Advisory

  6. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  7. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  8. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  9. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  10. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  11. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  12. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  13. US Energy Sector Vulnerabilities to Climate Change

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    On the cover: Trans-Alaska oil pipeline; aerial view of New Jersey refinery; coal barges on Mississippi River in St. Paul, Minnesota; power plant in Prince George's County, Maryland; Grand Coulee Dam in Washington State; corn field near Somers, Iowa; wind turbines in Texas. Photo credits: iStockphoto U.S. ENERGY SECTOR VULNERABILITIES TO CLIMATE CHANGE AND EXTREME WEATHER Acknowledgements This report was drafted by the U.S. Department of Energy's Office of Policy and International Affairs

  14. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  15. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  16. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  17. Managing America's Defense Nuclear Waste | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Managing America's Defense Nuclear Waste Managing America's Defense Nuclear Waste PDF icon Managing America's Defense Nuclear Waste More Documents & Publications Reorganization of the Office of Energy Efficiency and Renewable Energy: Preliminary Observations National Defense Authorization Act for Fiscal Year 2005, Information Request, Mission & Functions Statement for the Office of Environmental Management

  18. NA 20 - Deputy Administrator for Defense Nuclear Nonproliferation |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration 20 - Deputy Administrator for Defense Nuclear Nonproliferation

  19. NA 70 - Associate Administrator for Defense Nuclear Security | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration 70 - Associate Administrator for Defense Nuclear Security

  20. Department of Defense Nuclear/Biological/Chemical (NBC) defense: Annual report to Congress. Annual report

    SciTech Connect (OSTI)

    1997-03-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703 (50 USC 1522), mandates the consolidation of all Department of Defense chemical and biological (CB) defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a nuclear, biological and chemical (NBC) contaminated environment. This report contains modernization plan summaries that highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program. 50 USC 1522 has been a critical tool for ensuring the elimination of redundant programs, focusing funds on program priorities, and enhancing readiness. While many problems remain in consolidating the NBC defense program, significant and measurable progress has been made in fulfilling the letter and the intent of Congress. There has been a consolidation of the research, development and acquisition organizations for NBC defense, including the consolidation of all research, development, test and evaluation, and procurement funds for NBC defense. There has been significant progress in the development of Joint training, doctrine development, and requirements generation. Modernization and technology plans have been developed that will begin to show real savings and true consolidation of efforts among the Services. The fruits of these plans will be realized over the next few years as the public law has time to take effect and will result in the increased readiness of U.S. forces. The objective of the Department of Defense (DoD) NBC defense program is to enable our forces to survive, fight, and win in NBC warfare environments. Numerous rapidly changing factors continually influence the program and its management.

  1. Vulnerability Analysis of Energy Delivery Control Systems

    Energy Savers [EERE]

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  2. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  3. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    SciTech Connect (OSTI)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  4. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  5. Protection Programming Defensive Planning for Fixed Facilities

    Energy Savers [EERE]

    NOT MEASUREMENT SENSITIVE DOE STD-1207-2012 December 2012 DOE STANDARD Protection Program Defensive Planning For Fixed Facilities U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE STD-1207-2012 This Page Intentionally Left Blank ii DOE STD-1207-2012 TABLE OF CONTENTS

  6. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  7. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  8. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  9. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  10. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR

  11. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  12. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  13. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  14. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  15. V-062: Asterisk Two Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Asterisk, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).

  16. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Broader source: Energy.gov (indexed) [DOE]

    Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather ii NOTICE This ... States government or any agency thereof. energy.govindianenergy | indianenergy@hq.doe.go...

  17. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  18. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  19. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  1. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  2. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  3. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  4. Vulnerability Analysis of Energy Delivery Control Systems - 2011...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability Analysis of Energy Delivery Control Systems - 2011 Cybersecurity for energy ... (DOEOE) National Supervisory Control and Data Acquisition (SCADA) Test Bed ...

  5. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton; Phillips, Cynthia A.

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  6. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  7. The Defense Logistics Agency, Hydrogen-Powered Forklift Test...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli ...

  8. Their best defense is good fiscal sense (Daily Press) | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    https:www.jlab.orgnewsarticlestheir-best-defense-good-fiscal-sense-daily-press Their best defense is good fiscal sense Top Guard Security finds it can be a good idea to say,...

  9. NREL: Department of Defense Energy Programs - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Publications The following publications feature information about NREL's work with the U.S. Department of Defense (DOD) on energy projects. Army Net Zero: Lessons Learned in Net Zero Energy (Report) The U.S. Army (Army) presents a compilation of lessons learned from the Army's Net Zero Pilot Implementation Program, including specific examples of activities in each of the Net Zero Implementation Framework's implementation phases, and feedback from those involved with the Net Zero pilot program.

  10. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments Programs Defense Systems & Assessments Accelerating Innovation for the Warfighter Accelerating Innovation into the Hands of the Warfighter Supporting Ballistic Missile Defense Supporting Ballistic Missile Defense Launching GPS Satellites Launch of GPS satellite About Defense Systems & Assessments Our engineering, science, and technology expertise supports soldiers on the battlefield. About Us Program Areas Our multi-faceted research detects and defends against threats

  11. Sandia National Laboratories: National Security Missions: Defense Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Assessments: Program Areas Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Program Areas EOD security and defense photo Sandia's engineering, science, and technology expertise helps anticipate and solve the nation's toughest security challenges. Defense Systems & Assessments work is focused in seven main program areas: Information Operations: Information Operations develops technologies that help protect U.S. government,

  12. Bottoms Up. [report on the Defense Department] (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    structure, modernization programs, industrial base, and infrastucture needed to meet ... Technology, Weaponry, & National Defense; 350100 -- Arms Control-- Policy, Negotiations

  13. November 8, 1983: Defense Waste Processing Facility | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983: Defense Waste Processing Facility November 8, 1983 The Department begins construction of the Defense Waste Processing Facility (DWPF) at the Savannah River Plant in South Carolina. DWPF is designed to make high-level nuclear waste into a glass-like substance, which will then be shipped to a repository. DWPF will mix borosilicate glass with the waste, heat it to 2000 degrees F, and

  14. 2011 Annual Planning Summary for Defense Nuclear Nonproliferation (NA-20)

    Broader source: Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within Defense Nuclear Nonproliferation (NA-20).

  15. Available 45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE...

    Office of Scientific and Technical Information (OSTI)

    NATIONAL DEFENSE; CHEMICAL EXPLOSIONS; SHOCK WAVES; INDUSTRIAL PLANTS; ACCIDENTS; SAFETY; MECHANICAL STRUCTURES; BLAST EFFECTS; DYNAMIC LOADS; BUILDINGS; CHEMICAL EXPLOSIVES;...

  16. Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations

    Energy Savers [EERE]

    | Department of Energy Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations Defense Nuclear Facilities Safety Board (DNFSB) Letters and Recommendations The Defense Nuclear Facilities Safety Board (DNFSB) is an independent organization within the executive branch chartered with the responsibility of providing recommendations and advice to the President and the Secretary of Energy regarding

  17. NAP-XX Defense Programs Business Requirements and Processes Manual

    National Nuclear Security Administration (NNSA)

    Programs http://nnsa.energy.gov printed copies are uncontrolled SUPPLEMENTAL DIRECTIVE Approved: 2-25-16 DEFENSE PROGRAMS BUSINESS PROCESS SYSTEM (DPBPS) NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Programs NNSA SD 452.3-1A THIS PAGE INTENTIONALLY LEFT BLANK NNSA SD 452.3-1A 1 2-25-16 DEFENSE PROGRAMS BUSINESS PROCESS SYSTEM 1. PURPOSE. This supplemental directive (SD) establishes the Defense Programs Business Process System (DPBPS) Portal as the mechanism for implementing DOE

  18. National Defense Authorization Act for Fiscal Year 2000 § 3164:

    Energy Savers [EERE]

    Whistleblower Protection Program | Department of Energy National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program National Defense Authorization Act for Fiscal Year 2000 § 3164: Whistleblower Protection Program Stakeholders: DOE Employees and Contractors engaged in defense activities for the Department Scope: Section 3164 of the National Defense Authorization Act for Fiscal Year 2000 implements a whistleblower protection program to ensure that covered

  19. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  20. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  1. The Office of Environmental Management Non-Defense Environmental Cleanup |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Non-Defense Environmental Cleanup The Office of Environmental Management Non-Defense Environmental Cleanup PDF icon Microsoft Word - 8E2A4440.doc More Documents & Publications Microsoft Word - PSRP Updates 6-25-10_v2 The Office of Environmental Management (EM) Defense Environmental Cleanup The Office of Environmental Management Uranium Enrichment D&D

  2. A cognitive and economic decision theory for examining cyber defense strategies.

    SciTech Connect (OSTI)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  3. Toward a defense-dominated world

    SciTech Connect (OSTI)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  4. Department of Defense Nuclear/Biological/Chemical (NBC) warfare defense, annual report to Congress. Final report FY96

    SciTech Connect (OSTI)

    1996-04-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law No. 103-160, Section 1703, mandates the consolidation of all Department of Defense chemical and biological defense programs. As part of this consolidation, the Secretary of Defense is directed to submit an assessment and a description of plans to improve readiness to survive, fight and win in a chemically or biologically contaminated environment. This report contains modernizations plan summaries which highlight the Department`s approach to improve current NBC defense equipment and resolve current shortcomings in the program.

  5. The Salt Defense Disposal Investigations (SDDI)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Salt Defense Disposal Investigations (SDDI) will utilize a newly mined Underground Research Lab (URL) in WIPP to perform a cost effective, proof-of-principle feld test of the emplacement of heat-generating radioactive waste and validate modeling efforts. The goals of the SDDI Thermal Test are to: * Demonstrate a proof-of-principle concept for in-drift disposal in salt. * Investigate, in a specifc emplacement concept, the response of the salt to heat. * Develop a full-scale response for run-of-

  6. NREL: Department of Defense Energy Programs - Webmaster

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Webmaster Please enter your name and e-mail address in the boxes provided, then type your message below. When you are finished, click "Send Message." NOTE: If you enter your e-mail address incorrectly, we will be unable to reply. Your name: Your email address: Your message: Send Message Printable Version Department of Defense Energy Programs Home Projects Publications News Contact Us Did you find what you needed? Yes 1 No 0 Thank you for your feedback. Would you like to take a moment

  7. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  8. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  9. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  10. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  11. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  12. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience ...

  13. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  14. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  15. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  16. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  17. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  18. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  19. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  20. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  1. Common Cyber Security Vulnerabilities Observed in Control System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  2. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  3. Top 10 Vulnerabilities of Control Systems and Their Associated Migitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2006) | Department of Energy Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document addresses potential risks that can apply to some electricity sector organizations and provides practices that can help mitigate the risks. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon Top 10

  4. Title III of the Defense Production Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Title III of the Defense Production Act Title III of the Defense Production Act Matthew Seaford presentation on Title III of the Defense Production Act at the Industry Roundtable. PDF icon 2_seaford_roundtable.pdf More Documents & Publications A National Strategic Plan For Advanced Manufacturing Market Drivers for Biofuels Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

  5. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan,

    Energy Savers [EERE]

    Departmental Representative to the DNFSB | Department of Energy Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB DNFSB Mission The Board provides independent analysis, advice and recommendations to the Secretary to ensure adequate protection to public health and safety at defense nuclear facilities. Identify Department

  6. ACQUISITION LETTER 2014-03: ALLOWABILITY OF CONTRACTOR LITIGATION DEFENSE

    Office of Environmental Management (EM)

    AND SETTLEMENT COSTS | Department of Energy 3: ALLOWABILITY OF CONTRACTOR LITIGATION DEFENSE AND SETTLEMENT COSTS ACQUISITION LETTER 2014-03: ALLOWABILITY OF CONTRACTOR LITIGATION DEFENSE AND SETTLEMENT COSTS The subject Acquisition Letter's purpose is to provide guidance to Contracting Officers on allowability of contractor litigation defense and settlement costs in light of Secretary of the Army v. Tecom. The guidance applies to legal costs related to allegations of discrimination where

  7. 2015 NNSA Defense Programs Science Council | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration 2015 NNSA Defense Programs Science Council Friday, May 15, 2015 - 12:30pm 2015 NNSA Science Council The 2015 NNSA Defense Programs Science Council, comprising representatives from each of the three NNSA national security laboratories and one person representing the production sites, is now fully staffed. The Science Council was re-established in 2010 by Dr. Don Cook, Deputy Administrator of Defense Programs, to investigate and explore cross-cutting science, technology and

  8. Cyber Defense Competition Draws Students to Argonne | Argonne National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratory Members of the team from Lewis University work to defend their virtual grid system from attack at the first annual Argonne Collegiate Cyber Defense Competition. Members of the team from Lewis University work to defend their virtual grid system from attack at the first annual Argonne Collegiate Cyber Defense Competition. Cyber Defense Competition Draws Students to Argonne By Greg Cunningham * April 26, 2016 Tweet EmailPrint More than 75 aspiring cyber defenders from across Illinois

  9. History of Hanford Site Defense Production (Brief)

    SciTech Connect (OSTI)

    GERBER, M S

    2001-02-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

  10. Second Line of Defense Spares Program Assessment

    SciTech Connect (OSTI)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  11. Y-12 Successfully Meets and Exceeds Defense Programs Goals During...

    National Nuclear Security Administration (NNSA)

    Blog Home Field Offices Welcome to the NNSA Production Office NPO News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and...

  12. Defense-in-Depth, How Department of Energy Implements Radiation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (DOE) has adopted an integrated protection system for the safety of radioactive waste ... The integrated protectionsystem is implemented using a defense-in-depth approach taking ...

  13. NREL: Department of Defense Energy Programs - Contact Us

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy System Integration Ben Kroposki Drop-In or Infrastructure-Compatible Biofuels Rich Bolin Strategic Energy Management ... Department of Defense Energy Programs Home Projects ...

  14. Legacy Management Work Progresses on Defense-Related Uranium...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    defense-related legacy uranium mine sites located within 11 uranium mining districts in 6 western states. At these sites, photographs and global positioning location data were...

  15. NNSA and Defense Nuclear Facilities Safety Board certifications...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    allocated funding NNSA and Defense Nuclear Facilities Safety Board certifications free up 47 million in previously allocated funding The DNFSB and NNSA required the CMRR...

  16. NA 70 - Associate Administrator for Defense Nuclear Security...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 70 - Associate Administrator for Defense ... NA 70 - Associate Administrator...

  17. NA 20 - Deputy Administrator for Defense Nuclear Nonproliferation...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 20 - Deputy Administrator for Defense ... NA 20 - Deputy Administrator for...

  18. NA 10 - Deputy Administrator for Defense Programs | National...

    National Nuclear Security Administration (NNSA)

    Us Our Operations Management and Budget Office of Civil Rights Workforce Statistics NA 10 - Deputy Administrator for Defense Programs NA 10 - Deputy Administrator for...

  19. 2013 NNSA Defense Programs Science Council | National Nuclear...

    National Nuclear Security Administration (NNSA)

    NNSA Defense Programs Science Council | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  20. Comments of the Natural Resource Defense Council on DOE's Request...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    on Reducing Regulatory Burden Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden On behalf of the Natural ...

  1. Microsoft Word - Defense Science Quarterly 05-08.doc

    National Nuclear Security Administration (NNSA)

    ... and Mike Kreisler Student Participants For more information about the SSAA Program check out the Defense Science University Programs web site at http:www.nnsa.energy.govdsup. ...

  2. Shear Rolling of Magnesium Sheet for Automotive, Defense, and...

    Office of Scientific and Technical Information (OSTI)

    Shear Rolling of Magnesium Sheet for Automotive, Defense, and Energy Applications Citation ... Visit OSTI to utilize additional information resources in energy science and technology. A ...

  3. Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Nuclear Facilities Safety Board (DNFSB) Update - Dale Govan, Departmental Representative to the DNFSB DNFSB Mission The Board provides independent analysis, advice and ...

  4. Energy Department to Loan Emergency Fuel to Department of Defense...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Defense Logistics Agency (DLA) will begin drawing down stocks from the heating oil reserve terminal in Groton, Connecticut as early as tomorrow. The fuel, which will be ...

  5. National Defense Authorization Act for Fiscal Year 2005, Information

    Energy Savers [EERE]

    Request, | Department of Energy National Defense Authorization Act for Fiscal Year 2005, Information Request, National Defense Authorization Act for Fiscal Year 2005, Information Request, Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition_2008_2009_EM_Additional_Material_MA_Copy.pdf PUBLIC LAW 108-375-OCT. 28, 2004 118 STAT. 1811 Public Law 108-375, 108th Congress PDF icon National Defense Authorization Act for

  6. Shear Rolling of Magnesium Sheet for Automotive, Defense, and...

    Office of Scientific and Technical Information (OSTI)

    Title: Shear Rolling of Magnesium Sheet for Automotive, Defense, and Energy Applications Authors: Muralidharan, Govindarajan 1 ; Muth, Thomas R 1 ; Peter, William H 1 ; ...

  7. EM's Defense Waste Processing Facility Achieves Waste Cleanup Milestone |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Defense Waste Processing Facility Achieves Waste Cleanup Milestone EM's Defense Waste Processing Facility Achieves Waste Cleanup Milestone January 14, 2016 - 12:10pm Addthis The Defense Waste Processing Facility. The Defense Waste Processing Facility. If 4,000 of the 10-feet tall, 2-feet wide canisters were laid end to end, they would stretch more than 7.5 miles. If 4,000 of the 10-feet tall, 2-feet wide canisters were laid end to end, they would stretch more than 7.5

  8. Renewable Energy and Defense Geospatial Database | Open Energy...

    Open Energy Info (EERE)

    Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Renewable Energy and Defense Geospatial Database Abstract This database provides GIS data...

  9. National Defense Authorization Act for Fiscal Year 2005, Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Section 3116 from "National Defense Authorization Act for Fiscal Year 2005" (Public Law 108-375 Oct. 28 2004) Transition20082009EMAdditionalMaterialMACopy.pdf PUBLIC LAW ...

  10. Col. Kabban receives NNSA Defense Programs Excellence Award ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Excellence Award Col. Kabban receives NNSA Defense Programs Excellence Award Brig. Gen. Jim Dawkins, NNSA's Principal Assistant Deputy Administrator for Military Application,...

  11. Evaluating Moving Target Defense with PLADD

    SciTech Connect (OSTI)

    Jones, Stephen T.; Outkin, Alexander V.; Gearhart, Jared Lee; Hobbs, Jacob Aaron; Siirola, John Daniel; Phillips, Cynthia A.; Verzi, Stephen Joseph; Tauritz, Daniel; Mulder, Samuel A.; Naugle, Asmeret Bier

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  12. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  13. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  14. Conceptual waste package interim product specifications and data requirements for disposal of borosilicate glass defense high-level waste forms in salt geologic repositories

    SciTech Connect (OSTI)

    Not Available

    1983-06-01

    The conceptual waste package interim product specifications and data requirements presented are applicable specifically to the normal borosilicate glass product of the Defense Waste Processing Facility (DWPF). They provide preliminary numerical values for the defense high-level waste form parameters and properties identified in the waste form performance specification for geologic isolation in salt repositories. Subject areas treated include containment and isolation, operational period safety, criticality control, waste form/production canister identification, and waste package performance testing requirements. This document was generated for use in the development of conceptual waste package designs in salt. It will be revised as additional data, analyses, and regulatory requirements become available.

  15. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  16. EIS-0082: Defense Waste Processing Facility, Savannah River Plant

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Defense Waste and Byproducts Management developed this EIS to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility at the SRP site.

  17. Defense, Interior Departments Pursue Renewable Energy on Federal Lands

    Broader source: Energy.gov [DOE]

    The Interior Department announced on August 6 that Secretary of Defense Leon Panetta and Secretary of the Interior Ken Salazar have signed a Memorandum of Understanding (MOU) that encourages appropriate development of renewable energy projects on public lands that are set aside for defense-related purposes, and on other onshore and offshore areas near military installations.

  18. Deception used for Cyber Defense of Control Systems

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  19. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  20. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  1. Second Line of Defense Spares Program

    SciTech Connect (OSTI)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  2. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  3. Peptide identification

    DOE Patents [OSTI]

    Jarman, Kristin H [Richland, WA; Cannon, William R [Richland, WA; Jarman, Kenneth D [Richland, WA; Heredia-Langner, Alejandro [Richland, WA

    2011-07-12

    Peptides are identified from a list of candidates using collision-induced dissociation tandem mass spectrometry data. A probabilistic model for the occurrence of spectral peaks corresponding to frequently observed partial peptide fragment ions is applied. As part of the identification procedure, a probability score is produced that indicates the likelihood of any given candidate being the correct match. The statistical significance of the score is known without necessarily having reference to the actual identity of the peptide. In one form of the invention, a genetic algorithm is applied to candidate peptides using an objective function that takes into account the number of shifted peaks appearing in the candidate spectrum relative to the test spectrum.

  4. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  5. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  6. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  7. PINS Testing and Modification for Explosive Identification

    SciTech Connect (OSTI)

    E.H. Seabury; A.J. Caffrey

    2011-09-01

    The INL's Portable Isotopic Neutron Spectroscopy System (PINS)1 non-intrusively identifies the chemical fill of munitions and sealed containers. PINS is used routinely by the U.S. Army, the Defense Threat Reduction Agency, and foreign military units to determine the contents of munitions and other containers suspected to contain explosives, smoke-generating chemicals, and chemical warfare agents such as mustard and nerve gas. The objects assayed with PINS range from softball-sized M139 chemical bomblets to 200 gallon DOT 500X ton containers. INL had previously examined2 the feasibility of using a similar system for the identification of explosives, and based on this proof-of-principle test, the development of a dedicated system for the identification of explosives in an improvised nuclear device appears entirely feasible. INL has been tasked by NNSA NA-42 Render Safe Research and Development with the development of such a system.

  8. Secretary Chu Visits Russian Seaport, Checks Out Second Line of Defense Nuclear Detection System

    Broader source: Energy.gov [DOE]

    Through strong partnerships with other countries, we can secure vulnerable nuclear material around the world.

  9. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-12-30

    The manual defines the process DOE will use to interface with the Defense Nuclear Facilities Safety Board and its staff. Canceled by DOE M 140.1-1A. Does not cancel other directives.

  10. NREL: Department of Defense Energy Programs - Energy Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and air conditioning (HVAC) systems, and also added renewable energy generation. Microgrid energy integration-NREL is working with the U.S. Department of Defense and the U.S....

  11. TFC-0009- In the Matter of Environmental Defense Institute

    Broader source: Energy.gov [DOE]

    On March 14, 2011, Environmental Defense Institute (EDI) filed an Appeal from a determination issued by the Idaho Operations Office (Idaho) of the Department of Energy (DOE) under the Freedom of...

  12. Ike Skelton Defense Authorization Act | Open Energy Information

    Open Energy Info (EERE)

    for the defense of the U.S. and its interests abroad, for military construction and for national security-related energy programs. Published NA Year Signed or Took Effect 2011...

  13. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-01-26

    This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1.

  14. Rationality Validation of a Layered Decision Model for Network Defense

    SciTech Connect (OSTI)

    Wei, Huaqiang; Alves-Foss, James; Zhang, Du; Frincke, Deb

    2007-08-31

    We propose a cost-effective network defense strategy built on three key: three decision layers: security policies, defense strategies, and real-time defense tactics for countering immediate threats. A layered decision model (LDM) can be used to capture this decision process. The LDM helps decision-makers gain insight into the hierarchical relationships among inter-connected entities and decision types, and supports the selection of cost-effective defense mechanisms to safeguard computer networks. To be effective as a business tool, it is first necessary to validate the rationality of model before applying it to real-world business cases. This paper describes our efforts in validating the LDM rationality through simulation.

  15. The Defense Logistics Agency (DLA) RFP - Deadline - July 31,...

    Open Energy Info (EERE)

    for Proposals rfp Deadline - July 31, 2014 The Defense Logistics Agency (DLA) RFP (Sol. SPE600-14-R-0415) seeking up to 830,843 megawatt-hours of renewable energy...

  16. NNSA's Second Line of Defense Program Receives Capability Award...

    National Nuclear Security Administration (NNSA)

    the United Nations Interregional Crime and Justice Research Institute (UNICRI) and the U.S. Defense Threat Reduction Agency (DTRA). SLD's capacity-building work in the area of...

  17. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-05-14

    This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Supersedes DOE O 452.6.

  18. Interface with the Defense Nuclear Facilities Safety Board

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-30

    This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Supersedes DOE M 140.1-1A.

  19. Department of Defense Representatives Visit Hanford to Benchmark Safety

    Broader source: Energy.gov [DOE]

    RICHLAND, Wash., December 16, 2005, Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP CX) working to reduce injuries at selected (DoD)...

  20. Defense Production Act of 1950 in U.S.C. | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense Production Act of 1950 in U.S.C. Defense Production Act of 1950 in U.S.C. CITE: 50USC--App.2061 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2062 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2071 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2072 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2073 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE: 50USC--App.2074 TITLE 50, APPENDIX--WAR AND NATIONAL DEFENSE CITE:

  1. Lessons learned from U.S. Department of Defense 911-Bio Advanced Concept Technology Demonstrations.

    SciTech Connect (OSTI)

    Baldwin, T.; Gasper, W.; Lacher, L.; Newsom, D.; Yantosik, G.

    1999-07-06

    The US Department of Defense (DoD), in cooperation with other federal agencies, has taken many initiatives to improve its ability to support civilian response to a domestic biological terrorism incident. This paper discusses one initiative, the 911-Bio Advanced Concept Technology Demonstrations (ACTDs), conducted by the Office of the Secretary of Defense during 1997 to better understand: (1) the capability of newly developed chemical and biological collection and identification technologies in a field environment; (2) the ability of specialized DoD response teams to use these new technologies within the structure of cooperating DoD and civilian consequence management organizations; and (3) the adequacy of current modeling tools for predicting the dispersal of biological hazards. This paper discusses the experience of the ACTDs from the civilian community support perspective. The 911-Bio ACTD project provided a valuable opportunity for DoD and civilian officials to learn how they should use their combined capabilities to manage the aftermath of a domestic biological terrorism incident.

  2. Department of Defense Benchmarks VPP in Visit to Hanford

    Broader source: Energy.gov [DOE]

    Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP-CX) are working to meet a safety and health goal established by Secretary of Defense Donald Rumsfeld to reduce injuries at DoD sites nationwide. In order to accomplish this goal, DoD visited the Department of Energy's (DOE's) Hanford Site in southeast Washington State on December 12, 2005, to learn about its exemplary safety programs and benchmark the site's VPP effort.

  3. Ex Parte Memorandum - Natural Resources Defense Council | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy - Natural Resources Defense Council Ex Parte Memorandum - Natural Resources Defense Council On Friday, October 21, 2011, a group of non-profit and state energy efficiency advocates met with representatives of the Department of Energy to discuss the Direct Final Rule for Residential Furnaces, Heat Pumps and Central Air Conditioners (Energy Conservation Program: Energy Conservation Standards for Residential Furnaces and Residential Central Air Conditioners and Heat Pumps, Direct Final

  4. Sequential Detection of Fission Processes for Harbor Defense (Conference) |

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Sequential Detection of Fission Processes for Harbor Defense Citation Details In-Document Search Title: Sequential Detection of Fission Processes for Harbor Defense With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their Îł-ray emissions has been

  5. Energy and Defense Departments Announce Agreement to Enhance Cooperation on

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clean Energy and Strengthen Energy Security | Department of Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security July 27, 2010 - 12:00am Addthis Washington, D.C. - At a White House Forum on Energy Security today, U.S. Deputy Secretary of Energy Daniel Poneman announced a Memorandum of Understanding (MOU)

  6. Office of Defense Nuclear Nonproliferation | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Office of Defense Nuclear Nonproliferation Nuclear forensics, explained: NNSA analytic chemists help keep the world safe One of the gravest threats the world faces is the possibility that terrorists will acquire nuclear weapons or the necessary materials to construct a weapon. Part of the work of NNSA's Office of Defense Nuclear Nonproliferation and the national laboratories is to support investigations into the... DOE/NNSA Successfully Establishes Uranium Lease and Takeback

  7. Office of Defense Programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Programs NNSA Physicist Named One of Ebony's Power 100 Dr. Njema Frazier walked the red carpet at the Ebony Power 100 event in Los Angeles Dec. 2. Dr. Njema Frazier is a physicist in the NNSA's Office of Defense Programs, leading scientific and technical efforts to ensure that the United States maintains a credible nuclear deterrent... NNSA releases Stockpile Stewardship Program quarterly experiments summary WASHIGTON, DC. - The National Nuclear Security Administration today released its

  8. Deputy Science Advisor to the Deputy Administrator for Defense Programs |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Deputy Science Advisor to the Deputy Administrator for Defense Programs John Maenchen John Maenchen July 2009 Peter Haas Award from the Institute of Electrical and Electronic Engineers (IEEE) Dr. John Maenchen, deputy science advisor to the Deputy Administrator for Defense Programs, has received the prestigious Peter Haas Award from the Institute of Electrical and Electronic Engineers (IEEE). The Peter Haas Award is given by the IEEE's Nuclear and

  9. Microsoft Word - Defense Science Quarterly 05-08.doc

    National Nuclear Security Administration (NNSA)

    Office of Defense Science May 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Advanced Certification 3 Delivering High Energy Density Physics Data on the National Ignition Facility to Validate Predictive Physics Models 5 Texas Petawatt Laser Achieves Power Milestone 6 Sandia Light Gas Gun Tests Demonstrate the Ability to Deliver an Engineered Shock Wave Using a Graded-Density Thermal Spray Coating 7 Stewardship Science Academic Alliances Symposium Highlights 9

  10. Microsoft Word - Defense Science Quarterly 08-08.doc

    National Nuclear Security Administration (NNSA)

    August 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Derivative Applications of Pulsed Power Science and Technology 4 LANSCE-R Means More Beam for National Security Research 6 Dual Axis Radiographic Hydrodynamics Test (DARHT) 2 nd Axis Completed and Put into Operation 7 Annual Symposium of the Stewardship Science Graduate Fellowship Program 8 Publication Highlights 9 ICOPS 2008 9 Highlights and Awards Message from the Director Chris Deeney, Defense Science

  11. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  12. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  13. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  14. T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple buffer overflow vulnerabilities exist in the WRF and ARF players. The vulnerabilities may lead to a crash of the player application or, in some cases, remote code execution could occur.

  15. U-146: Adobe Reader/Acrobat Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Adobe Reader/Acrobat Multiple Vulnerabilities U-146: Adobe Reader/Acrobat Multiple Vulnerabilities April 12, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Reader and Adobe Acrobat. PLATFORM: Adobe Acrobat 9.x Adobe Acrobat X 10.x Adobe Reader 9.x Adobe Reader X 10.x ABSTRACT: Vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, gain knowledge of potentially sensitive

  16. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  17. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Energy Savers [EERE]

    Server Cross-Site Scripting Vulnerability | Department of Energy 11: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A

  18. V-200: Apache Struts DefaultActionMapper Redirection and OGNL Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct spoofing attacks and bypass certain security restrictions

  19. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  20. U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

  1. Briefing Memo: Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  2. Vulnerability, Sensitivity, and Coping/Adaptive Capacity Worldwide

    SciTech Connect (OSTI)

    Malone, Elizabeth L.; Brenkert, Antoinette L.

    2009-10-01

    Research and analyses have repeatedly shown that impacts of climate change will be unevenly distributed and will affect various societies in various ways. The severity of impacts will depend in part on ability to cope in the short term and adapt in the longer term. However, it has been difficult to find a comparative basis on which to assess differential impacts of climate change. This chapter describes the Vulnerability-Resilience Indicator Model that uses 18 proxy indicators, grouped into 8 elements, to assess on a quantitative basis the comparative potential vulnerability and resilience of countries to climate change. The model integrates socioeconomic and environmental information such as land use, crop production, water availability, per capita GDP, inequality, and health status. Comparative results for 160 countries are presented and analyzed.

  3. Agenda: Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session.

  4. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  5. Subsidence vulnerability in shallow room-and-pillar mines

    SciTech Connect (OSTI)

    Missavage, R.

    1985-07-01

    Concern over mining-related subsidence is inhibiting the development of surface land uses in previously mined areas and is constraining the recovery of coal resources in areas with established land uses that might be impacted by subsequent subsidence. The determination of subsidence vulnerability of mined-out areas (especially abandoned mine areas) can be a useful tool in the design and location of surface structures. A model has been developed for assessing subsidence vulnerability in shallow room-and-pillar mines based on the flexural rigidity and strength characteristics of the overlying strata. The model does not predict the subsidence profile or when the subsidence will occur. It only predicts those areas that are likely to subside. This paper briefly describes the model and its testing.

  6. The science, technology, and politics of ballistic missile defense

    SciTech Connect (OSTI)

    Coyle, Philip E.

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  7. T-682:Double free vulnerability in MapServer

    Broader source: Energy.gov [DOE]

    MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

  8. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    SciTech Connect (OSTI)

    Kersulis, Jonas; Hiskens, Ian; Chertkov, Michael; Backhaus, Scott N.; Bienstock, Daniel

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  9. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Energy Savers [EERE]

    6 by ISA - The Instrumentation, Systems and Automation Society. Presented at 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference; http://www.isa.org Mitigations for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security Communications & Cyber Security Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy

  10. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  11. Climate Change Vulnerability Assessment for Idaho National Laboratory

    SciTech Connect (OSTI)

    Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

    2014-10-01

    The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

  12. U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 0: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability U-020: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability October 26, 2011 - 9:00am Addthis PROBLEM: McAfee Web Gateway Web Access Cross Site Scripting Vulnerability. PLATFORM: The vulnerability is reported in versions prior to 7.1.5.2. ABSTRACT: Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behavior of a web application in a user's browser, without

  13. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  14. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  15. Some advances in U. S. space defense systems

    SciTech Connect (OSTI)

    Rongrui, W.

    1991-12-10

    This article, by way of a simple summary, introduces certain aspects of the U.S. Star Wars program which have undergone developments recently as well as experimentation planned in the future. In 1984, the U.S. Defense Department set up a Strategic Defense authority in order to carry out the Star Wars Program and put vigorous effort into the development of directed energy weapon, kinetic energy weapons, as well as research on a set of technologies such as early warning, aiming, tracking, and target recognition. This article, on the basis of openly published U.S. sources, takes a comprehensive look at the status of several areas of development in U.S. space defense systems.

  16. The Office of Environmental Management (EM) Defense Environmental Cleanup |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy (EM) Defense Environmental Cleanup The Office of Environmental Management (EM) Defense Environmental Cleanup PDF icon Microsoft Word - 271C2C7B.doc More Documents & Publications Microsoft Word - PSRP Updates 6-25-10_v2 Above on the left is K-25, at Oak Ridge before and after the 844,000 sq-ft demolition. In addition, on the right: K Cooling Tower at Savannah River Site demolition. Deactivation & Decommissioning (D&D) Program Map Microsoft Word - PSRP Updates

  17. EM Leaders Earn National Defense Degrees | Department of Energy

    Energy Savers [EERE]

    Leaders Earn National Defense Degrees EM Leaders Earn National Defense Degrees August 31, 2015 - 12:00pm Addthis Stephen Casey of the Portsmouth/Paducah Project Office receives his degree from NDU President Maj. Gen. Frederick M. Padilla, U.S. Marine Corps, during the main campus graduation earlier this year at Fort Lesley J. McNair in Washington, D.C. Stephen Casey of the Portsmouth/Paducah Project Office receives his degree from NDU President Maj. Gen. Frederick M. Padilla, U.S. Marine Corps,

  18. T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

  19. COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 | Princeton Plasma Physics Lab February 28, 2013, 4:15pm to 5:30pm Colloquia MBG Auditorium COLLOQUIUM: NOTE SPECIAL DATE - THURSDAY: Unique Vulnerability of the New York/New Jersey Metro Region to Hurricane Destruction - A New Perspective Based on Recent Research on Irene 2011 and Sandy 2012 Professor Nicholas K. Coch Queens College CUNY In the last two years. the

  20. Defense Secretary Awards EM Idaho Contractor Freedom Award at Pentagon

    Broader source: Energy.gov [DOE]

    IDAHO FALLS, Idaho – CH2M-WG Idaho (CWI), the main cleanup contractor for the EM program at the Idaho Operations Office, received the Secretary of Defense Employer Support Freedom Award at the Pentagon for its support of National Guard and Reserve employees.

  1. Defense High Level Waste Disposal Container System Description

    SciTech Connect (OSTI)

    2000-10-12

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms (IPWF)) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. U.S. Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as 'co-disposal'. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by which to identify the disposal container and its contents. Different materials will be selected for the disposal container inner and outer cylinders. The two metal cylinders, in combination with the Emplacement Drift System, drip shield, and natural barrier, will support the design philosophy of defense-in-depth. The use of materials with different properties prevents a single mode failure from breaching the waste package. The inner cylinder and inner cylinder lids will be constructed of stainless steel and the outer cylinder and outer cylinder lids will be a barrier made of high-nickel alloy. The defense HLW disposal container interfaces with the emplacement drift environment and the internal waste by transferring heat from the canisters to the external environment and by protecting the canisters and their contents from damage/degradation by the external environment. The disposal container also interfaces with the canisters by limiting access of moderator and oxidizing agents to the waste. A loaded and sealed disposal container (waste package) interfaces with the Emplacement Drift System's emplacement drift waste package supports upon which the waste packages are placed. The disposal container interfaces with the Canister Transfer System, Waste Emplacement /Retrieval System, Disposal Container Handling System, and Waste Package Remediation System during loading, handling, transfer, emplacement, and retrieval for the disposal container/waste package.

  2. V-221: WordPress A Forms Plugin Cross-Site Request Forgery and Form Field Script Insertion Vulnerabilities

    Broader source: Energy.gov [DOE]

    This vulnerability can be exploited to conduct cross-site request forgery and script insertion attacks

  3. Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  4. Chemical Safety Vulnerability Working Group report. Volume 3

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  5. Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)

    SciTech Connect (OSTI)

    Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

    2013-02-01

    The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

  6. U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 96: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure

  7. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  8. V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

  9. T-572: VMware ESX/ESXi SLPD denial of service vulnerability

    Broader source: Energy.gov [DOE]

    VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

  10. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  11. U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 76: VMware vCenter Operations Cross-Site Scripting Vulnerability U-276: VMware vCenter Operations Cross-Site Scripting Vulnerability October 8, 2012 - 7:00am Addthis PROBLEM: VMware vCenter Operations Cross-Site Scripting Vulnerability PLATFORM: VMware vCenter Operations 1.x ABSTRACT: A vulnerability has been reported in VMware vCenter Operations, which can be exploited by malicious people to conduct cross-site scripting attacks. reference LINKS: Original Advisory

  12. V-041: Red Hat CloudForms Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple Vulnerabilities PLATFORM: CloudForms ABSTRACT: Multiple vulnerabilities have been reported in Red Hat CloudForms REFERENCE LINKS: RHSA-2012-1542-1 RHSA-2012-1543-1 Secunia Advisory SA51472 CVE-2012-1986 CVE-2012-1987 CVE-2012-1988 CVE-2012-2139 CVE-2012-2140 CVE-2012-2660 CVE-2012-2661 CVE-2012-2694 CVE-2012-2695 CVE-2012-3424

  13. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  14. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  15. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  16. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  17. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server. PLATFORM: * BlackBerry Enterprise Server Express version...

  18. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  19. U-225: Citrix Access Gateway Plug-in for Windows nsepacom ActiveX Control Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities in Citrix Access Gateway Plug-in for Windows can be exploited by malicious people to compromise a user's system.

  20. U-228: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions included with BlackBerry PlayBook tablet software versions...

  1. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  2. V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager

  3. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  4. V-197: Adobe ColdFusion 10 WebSockets Security Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to an unspecified error and can be exploited to invoke public methods on ColdFusion Components (CFC) using WebSockets

  5. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  6. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  7. V-158: BlackBerry Tablet OS Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in BlackBerry Tablet OS, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  8. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service)

  9. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  10. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  11. U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

  12. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  13. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  14. EIS-0347: Long-Term Management of the National Defense Stockpile Inventory of Excess Mercury

    Broader source: Energy.gov [DOE]

    This Defense Logistics Agency EIS evaluated alternatives for managing the Defense National Stockpile Center inventory of excess mercury. DOE was a cooperating agency for preparation of the draft EIS.

  15. Paul Longsworth Sworn in as NNSA Deputy Administrator for Defense Nuclear

    National Nuclear Security Administration (NNSA)

    Nonproliferation | National Nuclear Security Administration Paul Longsworth Sworn in as NNSA Deputy Administrator for Defense Nuclear Nonproliferation July 30, 2003 Paul Longsworth Sworn in as NNSA Deputy Administrator for Defense Nuclear Nonproliferation (PDF - 0.01Mb)~

  16. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian ...

  17. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect (OSTI)

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

  18. Natural Resources Defense Council Consent Decree, May 26, 1988 Summary

    Office of Environmental Management (EM)

    Decree No. 1:85-2583-6 State South Carolina Agreement Type Consent Decree Legal Driver(s) RCRA Scope Summary Establish guidelines for the closure of certain facilities at the Savannah River Plant. Parties DOE (SRP); State of South Carolina (Department of Health and Environmental Control); US DOJ; Natural Resources Defense Council; Energy Research Foundation; Assistant U.S. Attorney of the District of South Carolina; South Carolina League of Women Voters Date 5/26/1988 SCOPE * Establish

  19. Nuclear Weapon Surety Interface with the Department of Defense

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-19

    The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

  20. Microsoft Word - Defense Science Quarterly 02-08.doc

    National Nuclear Security Administration (NNSA)

    February 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 The Modernization of Nuclear Test Specific Techniques with a Focus on the Alpha-can Demonstrations 3 JASPER Update 4 Tenth Shot on Refurbished Z Measures Pressure Drive for Future experiments 5 High Energy Density Research at Los Alamos Examines the Hydrodynamics of Radiatively Heated and Shocked Embedded Layers 6 EXAFS Measurements of Material Properties at High Pressures and Strain Rates 7 Exploiting

  1. Microsoft Word - Defense Science Quarterly 03-09.doc

    National Nuclear Security Administration (NNSA)

    March 2009 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Carnegie-DOE Alliance Center 3 Cornell Center for the Study of Pulsed Power Driven High Energy Density Plasmas 4 Center of Excellence for Radioactive Ion Beam Studies for Stewardship Science 5 The Texas Center for High Intensity Laser Science 6 The Institute for Shock Physics, Washington State University 7 The High Pressure Science and Engineering Center at the University of Nevada, Las Vegas 8 HEDP Research at

  2. Microsoft Word - Defense Science Quarterly Nov 2007 final.doc

    National Nuclear Security Administration (NNSA)

    November 2007 Dr. Brad Wallin Dr. Robert Hanrahan Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Contributions of the Los Alamos Proton Radiography Program to the Nuclear Weapons Program 4 Contributions of the Los Alamos Weapons Neutron Research Facility Programs to the Nuclear Weapons Program 5 Cross-cutting Science: Materials in Extreme Environments 7 Academic Outreach: The Stewardship Science Academic Alliances Program 10 Z Refurbishment Project Wraps Up 11

  3. Department of Energy versus Department of Defense: security, classification markings, procedures, and clearance requirements

    SciTech Connect (OSTI)

    Not Available

    1985-01-01

    The differences between the Department of Energy's and the Department of Defense's system of classification and security are clarified.

  4. Report on Separate Disposal of Defense High-Level Radioactive Waste

    Broader source: Energy.gov [DOE]

    This is a report on the separate disposal of defense high-level radioactive waste and commercial nuclear waste.

  5. Comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

  6. Integrating environmental considerations in the defense acquisition process

    SciTech Connect (OSTI)

    Cubbage, C.H.; Loeher, C.F. III; Bird, J.R.

    1995-12-01

    The Federal Facilities compliance Act of 1992 directs all federal facilities including those under the auspices of the Department of Defense (DoD) to adhere to the ever growing number of environmental statutes. With a large percentage of the 1994 DoD budget dedicated to major acquisitions, it became apparent that an intensive study of the acquisition process was needed to identify milestone areas in which environmental protection requirements could be integrated. This paper provides a synopsis of the study which was undertaken to assist the DoD in understanding environmental considerations and complying with environmental legislation. The study utilized a three phased methodology which provided legislation analysis, process application, and guidance development. In phase one, over 25 Federal and 14 state environmental statutes and regulations, the tri-service regulations, and the DoD and EPA policy and procedures were analyzed. Phase two applied the environmental considerations and legislative analysis to the defense acquisition process, while phase three developed specific guidance to assist government personnel in their roles and responsibilities. The study resulted in the development of an expandable PC-based support system that integrated environmental protection considerations in the defense acquisition process and provided guidance to the responsible government official(s).

  7. Developing an institutional strategy for transporting defense transuranic waste materials

    SciTech Connect (OSTI)

    Guerrero, J.V.; Kresny, H.S.

    1986-01-01

    In late 1988, the US Department of Energy (DOE) expects to begin emplacing transuranic waste materials in the Waste Isolation Pilot Plant (WIPP), an R and D facility to demonstrate the safe disposal of radioactive wastes resulting from defense program activities. Transuranic wastes are production-related materials, e.g., clothes, rags, tools, and similar items. These materials are contaminated with alpha-emitting transuranium radionuclides with half-lives of > 20 yr and concentrations > 100 nCi/g. Much of the institutional groundwork has been done with local communities and the State of New Mexico on the siting and construction of the facility. A key to the success of the emplacement demonstration, however, will be a qualified transportation system together with institutional acceptance of the proposed shipments. The DOE's Defense Transuranic Waste Program, and its contractors, has lead responsibility for achieving this goal. The Joint Integration Office (JIO) of the DOE, located in Albuquerque, New Mexico, is taking the lead in implementing an integrated strategy for assessing nationwide institutional concerns over transportation of defense transuranic wastes and in developing ways to resolve or mitigate these concerns. Parallel prototype programs are under way to introduce both the new packaging systems and the institutional strategy to interested publics and organizations.

  8. Department of Defense Nuclear/Biological/Chemical (NBC) warfare defense. Annual report to Congress, June 1994. Final report, 1 October 1992-30 September 1993

    SciTech Connect (OSTI)

    Not Available

    1994-06-01

    The National Defense Authorization Act for Fiscal Year 1994, Public Law 103-160, Title XVII, Chemical and Biological Weapons Defense, section 1703, directed the Secretary of Defense to submit an assessment and a description of plans to improve readiness. The DoD objective is to enable our forces to survive, fight and win in NBC contaminated environments. Discussed are new management objectives impacted by declining resources and force structure versus an ever changing threat environment. Nuclear biological, Chemical, NBC, Defense, Logistics, Readiness, Training, Contamination avoidance, Protection, Decontamination.

  9. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  10. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  11. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  12. Climate change and health: Indoor heat exposure in vulnerable populations

    SciTech Connect (OSTI)

    White-Newsome, Jalonne L.; Sanchez, Brisa N.; Jolliet, Olivier; Zhang, Zhenzhen; Parker, Edith A.; Timothy Dvonch, J.; O'Neill, Marie S.

    2012-01-15

    Introduction: Climate change is increasing the frequency of heat waves and hot weather in many urban environments. Older people are more vulnerable to heat exposure but spend most of their time indoors. Few published studies have addressed indoor heat exposure in residences occupied by an elderly population. The purpose of this study is to explore the relationship between outdoor and indoor temperatures in homes occupied by the elderly and determine other predictors of indoor temperature. Materials and methods: We collected hourly indoor temperature measurements of 30 different homes; outdoor temperature, dewpoint temperature, and solar radiation data during summer 2009 in Detroit, MI. We used mixed linear regression to model indoor temperatures' responsiveness to weather, housing and environmental characteristics, and evaluated our ability to predict indoor heat exposures based on outdoor conditions. Results: Average maximum indoor temperature for all locations was 34.85 Degree-Sign C, 13.8 Degree-Sign C higher than average maximum outdoor temperature. Indoor temperatures of single family homes constructed of vinyl paneling or wood siding were more sensitive than brick homes to outdoor temperature changes and internal heat gains. Outdoor temperature, solar radiation, and dewpoint temperature predicted 38% of the variability of indoor temperatures. Conclusions: Indoor exposures to heat in Detroit exceed the comfort range among elderly occupants, and can be predicted using outdoor temperatures, characteristics of the housing stock and surroundings to improve heat exposure assessment for epidemiological investigations. Weatherizing homes and modifying home surroundings could mitigate indoor heat exposure among the elderly.

  13. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect (OSTI)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.

  14. NREL: Department of Defense Energy Programs Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Department of Defense Energy Programs A photo of the Fort Dalles Readiness Center with a small creek and new growth vegetation in front of the building and a parking lot to the left background of the creek. Progress on the Army's Road to Net Zero Energy NREL supports efficiency and renewable energy programs at nine installations An aerial photo of a large photovoltaic array on desert land with foothills and mountains in the background. Moving Fort Carson Toward Net Zero NREL is helping the Army

  15. Geotechnical Seismic Assessment Report for Defense Waste Processing Facility

    SciTech Connect (OSTI)

    McHood, M.

    2000-10-04

    High level waste facilities at the Savannah River Site include several major structures that must meet seismic requirements, including the Defense Waste Processing Facility. Numerous geotechnical and geological investigations have been performed to characterize the in-situ static and dynamic properties of the soil sediments. These investigations have led to conclusions concerning the stability of foundation soils in terms of liquefaction potential and structure settlement. This report reviews past work that addresses seismic soil stability and presents the results of more recent analyses incorporating updated seismic criteria.

  16. Defense waste vitrification studies during FY-1981. Summary report

    SciTech Connect (OSTI)

    Bjorklund, W.J. (comp.)

    1982-09-01

    Both simulated alkaline defense wastes and simulated acidic defense wastes (formed by treating alkaline waste with formic acid) were successfully vitrified in direct liquid-fed melter experiments. The vitrification process was improved while using the formate-treated waste. Leach resistance was essentially the same. Off-gas entrainment was the primary mechanism for material exiting the melter. When formate waste was vitrified, the flow behavior of the off gas from the melter changed dramatically from an erratic surging behavior to a more quiet, even flow. Hydrogen and CO were detectable while processing formate feed; however, levels exceeding the flamability limits in air were never approached. Two types of melter operation were tested during the year, one involving boost power. Several boosting methods located within the melter plenum were tested. When lid heating was being used, water spray cooling in the off gas was required. Countercurrent spray cooling was more effective than cocurrent spray cooling. Materials of construction for the off-gas system were examined. Inconel-690 is preferred in the plenum area. Inspection of the pilot-scale melter found that corrosion of the K-3 refractory and Inconel-690 electrodes was minimal. An overheating incident occurred with the LFCM in which glass temperatures up to 1480/sup 0/C were experienced. Lab-scale vitrification tests to study mercury behavior were also completed this year. 53 figures, 63 tables.

  17. Materials for defense/aerospace applications (NON-SV)

    SciTech Connect (OSTI)

    Ellis, A. R.

    2012-03-01

    Through this effort, Sandia and Lockheed Martin Aeronautics Company (LM Aero) sought to assess the feasibility of (1) applying special materials to a defense application; (2) developing a piezoelectric-based micro thermophotovoltaic (TPV) cell; and (3) building and delivering a prototype laboratory emission measurement system. This project supported the Stockpile Research & Development Program by contributing to the development of radio frequency (RF) MEMS- and optical MEMS-based components - such as switches, phase shifters, oscillators, and filters - with improved performance and reduced weight and size. Investigation of failure mechanisms and solutions helped to ensure that MEMS-based technology will meet performance requirements and long term reliability goals in the specified environments dictated by Lockheed Martin's commercial and defense applications. The objectives of this project were to (1) fabricate and test materials for military applications; (2) perform a feasibility study of a piezoelectric-based micro TPV cell; and (3) build and deliver a prototype laboratory emission measurement system. Sandia fabricated and tested properties of materials, studied options for manufacturing scale-up, and delivered a prototype IR Emissometer. LM Aero provided material requirements and designs. Both participated in the investigation of attachment methods and environmental effects on material performance, a feasibility study of piezoelectric TPV cells, an investigation and development of new approaches to implement the required material functionality, and analysis and validation of material performance physics, numerical models, and experimental metrology.

  18. Unmanned and Unattended Response Capability for Homeland Defense

    SciTech Connect (OSTI)

    BENNETT, PHIL C.

    2002-11-01

    An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

  19. Defense High-Level Waste Leaching Mechanisms Program. Final report

    SciTech Connect (OSTI)

    Mendel, J.E.

    1984-08-01

    The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90/sup 0/C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations.

  20. Cyber Security Research Frameworks For Coevolutionary Network Defense

    SciTech Connect (OSTI)

    Rush, George D.; Tauritz, Daniel Remy

    2015-12-03

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger, more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.

  1. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 86: IBM WebSphere Sensor Events Multiple Vulnerabilities U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities June 8, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM WebSphere Sensor Events PLATFORM: IBM WebSphere Sensor Events 7.x ABSTRACT: Some vulnerabilites have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks. Reference Links: Secunia ID 49413 No CVE references. Vendor URL IMPACT

  2. Toward US-Russian strategic defense: Ban the ABM Treaty now

    SciTech Connect (OSTI)

    Savelyev, A.

    1992-11-12

    Boris Yeltsin and George Bush agreed on June 17 to develop and deploy a jointly controlled global protection system against ballistic missile strikes. Three teams of Russian and American experts now are studying the Bush-Yeltsin idea, called the Joint Defense Program (JDP). The drive to develop a U.S.-Russian defense system, however, faces a formidable obstacle-the 1972 Anti-Ballistic Missile (ABM) Treaty, which prohibits not only the deployment of territorial defenses against strategic missiles but the creation of an infrastructure (or `base`) for such a defense. If America and Russia hope to build a common defense against ballistic missiles, they first will have to remove ABM Treaty obstacles to expanded U.S.-Russian cooperation and missile defense.

  3. An approach to determine a defensible spent fuel ratio.

    SciTech Connect (OSTI)

    Durbin, Samuel G.; Lindgren, Eric Richard

    2014-03-01

    Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

  4. Comments of the Natural Resource Defense Council on DOE's Request for

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information on Reducing Regulatory Burden | Department of Energy Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden Comments of the Natural Resource Defense Council on DOE's Request for Information on Reducing Regulatory Burden On behalf of the Natural Resources Defense Council and our more than 1.3 million members and online activists, we submit the following comments in response to the Department of Energy's (DOE) Request for Information on

  5. Tom D'Agostino to Lead NNSA's Defense Programs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tom D'Agostino to Lead NNSA's Defense Programs Tom D'Agostino to Lead NNSA's Defense Programs March 1, 2006 - 12:26pm Addthis WASHINGTON , DC - Secretary of Energy Samuel W. Bodman today announced that Thomas P. D'Agostino has been sworn in as Deputy Administrator for Defense Programs in the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). Deputy Administrator D'Agostino will lead NNSA's weapons programs, which maintain the reliability of our nation's nuclear weapons

  6. 2012 Annual Planning Summary for NNSA Defense Nuclear NonProliferation |

    Energy Savers [EERE]

    Department of Energy NNSA Defense Nuclear NonProliferation 2012 Annual Planning Summary for NNSA Defense Nuclear NonProliferation The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2012 and 2013 within the NNSA Defense Nuclear NonProliferation. Office spreadsheet icon APS-2012-NA-20.xls More Documents & Publications EA-1929: Final Environmental Assessment EA-1929: Draft Environmental Assessment Audit Report: OAS-L-12-07

  7. FIA-14-0085 - In the Matter of Allegheny Defense Project | Department of

    Energy Savers [EERE]

    Energy 5 - In the Matter of Allegheny Defense Project FIA-14-0085 - In the Matter of Allegheny Defense Project On January 21, 2015, the Department of Energy's (DOE) Office of Hearings and Appeals (OHA) denied a Freedom of Information Act Appeal (FOIA) filed by Allegheny Defense Project (Appellant) of a determination issued by the Office of Information Resources (OIR). In the Appeal, the Appellant challenged OIR's withholdings under Exemptions 4 and 5. OHA found that OIR properly withheld the

  8. Comments of the Natural Resource Defense Council on Energy Efficiency and

    Energy Savers [EERE]

    Sustainable Design Standards for New Federal Buildings; Notice of Proposed Rulemaking | Department of Energy the Natural Resource Defense Council on Energy Efficiency and Sustainable Design Standards for New Federal Buildings; Notice of Proposed Rulemaking Comments of the Natural Resource Defense Council on Energy Efficiency and Sustainable Design Standards for New Federal Buildings; Notice of Proposed Rulemaking On behalf of the Natural Resources Defense Council and our more than 1.3

  9. V-226: HP StoreOnce D2D Backup Systems Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 2.3.0 or 1.2.19. Addthis Related Articles U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability V-062: Asterisk Two Denial of...

  10. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  11. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  12. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  13. U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

  14. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  15. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  16. V-007: McAfee Firewall Enterprise ISC BIND Record Handling Lockup Vulnerability

    Broader source: Energy.gov [DOE]

    McAfee has acknowledged a vulnerability in McAfee Firewall Enterprise, which can be exploited by malicious people to cause a DoS (Denial of Service).

  17. Defense waste processing facility radioactive operations. Part 1 - operating experience

    SciTech Connect (OSTI)

    Little, D.B.; Gee, J.T.; Barnes, W.M.

    1997-12-31

    The Savannah River Site`s Defense Waste Processing Facility (DWPF) near Aiken, SC is the nation`s first and the world`s largest vitrification facility. Following a ten year construction program and a 3 year non-radioactive test program, DWPF began radioactive operations in March 1996. This paper presents the results of the first 9 months of radioactive operations. Topics include: operations of the remote processing equipment reliability, and decontamination facilities for the remote processing equipment. Key equipment discussed includes process pumps, telerobotic manipulators, infrared camera, Holledge{trademark} level gauges and in-cell (remote) cranes. Information is presented regarding equipment at the conclusion of the DWPF test program it also discussed, with special emphasis on agitator blades and cooling/heating coil wear. 3 refs., 4 figs.

  18. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Resilience Solutions | Department of Energy Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser. This report examines the current and potential future impacts of climate change and extreme weather on the U.S. energy sector at the regional level. It provides illustrative

  19. Assessment of chemical vulnerabilities in the Hanford high-level waste tanks

    SciTech Connect (OSTI)

    Meacham, J.E.

    1996-02-15

    The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

  20. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  1. T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

  2. Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995

    Broader source: Energy.gov [DOE]

    Defense Programs has undertaken an effort to compare the competencies in the GeneralTechnical Base Qualification Standard and the Functional Area Qualification Standards withvarious positions in...

  3. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    SciTech Connect (OSTI)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  4. Positron identification in APEX

    SciTech Connect (OSTI)

    Kaloskamis, N.I.

    1993-10-01

    The trigger which signals than an event of interest has occurred in APEX is based on the identification of back-to-back 511 keV positron annihilation radiation. The gamma rays are detected in 24- element position sensitive NaI(Tl) barrels which surround each silicon array. The gamma-ray information gives positron identification and allows the reconstruction of the location of the decaying positron on the silicon array. The principle of operation, design and performance will he presented including the energy, time and position resolutions. Examples of in-beam data show the successful suppression of false triggers from room background and beam-induced radiation, resuIting in the unambiguous identification and location of reaction positrons and the clean separation of positrons from the copious background of delta electrons.

  5. Anticipating Potential Waste Acceptance Criteria for Defense Spent Nuclear Fuel

    SciTech Connect (OSTI)

    Rechard, R.P.; Lord, M.E.; Stockman, C.T.; McCurley, R.D.

    1997-12-31

    The Office of Environmental Management of the U.S. Department of Energy is responsible for the safe management and disposal of DOE owned defense spent nuclear fuel and high level waste (DSNF/DHLW). A desirable option, direct disposal of the waste in the potential repository at Yucca Mountain, depends on the final waste acceptance criteria, which will be set by DOE`s Office of Civilian Radioactive Waste Management (OCRWM). However, evolving regulations make it difficult to determine what the final acceptance criteria will be. A method of anticipating waste acceptance criteria is to gain an understanding of the DOE owned waste types and their behavior in a disposal system through a performance assessment and contrast such behavior with characteristics of commercial spent fuel. Preliminary results from such an analysis indicate that releases of 99Tc and 237Np from commercial spent fuel exceed those of the DSNF/DHLW; thus, if commercial spent fuel can meet the waste acceptance criteria, then DSNF can also meet the criteria. In large part, these results are caused by the small percentage of total activity of the DSNF in the repository (1.5%) and regulatory mass (4%), and also because commercial fuel cladding was assumed to provide no protection.

  6. Accident Fault Trees for Defense Waste Processing Facility

    SciTech Connect (OSTI)

    Sarrack, A.G.

    1999-06-22

    The purpose of this report is to document fault tree analyses which have been completed for the Defense Waste Processing Facility (DWPF) safety analysis. Logic models for equipment failures and human error combinations that could lead to flammable gas explosions in various process tanks, or failure of critical support systems were developed for internal initiating events and for earthquakes. These fault trees provide frequency estimates for support systems failures and accidents that could lead to radioactive and hazardous chemical releases both on-site and off-site. Top event frequency results from these fault trees will be used in further APET analyses to calculate accident risk associated with DWPF facility operations. This report lists and explains important underlying assumptions, provides references for failure data sources, and briefly describes the fault tree method used. Specific commitments from DWPF to provide new procedural/administrative controls or system design changes are listed in the ''Facility Commitments'' section. The purpose of the ''Assumptions'' section is to clarify the basis for fault tree modeling, and is not necessarily a list of items required to be protected by Technical Safety Requirements (TSRs).

  7. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    SciTech Connect (OSTI)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  8. Environmental management requirements/defensible costs project. Final report

    SciTech Connect (OSTI)

    1996-02-01

    Lockheed Idaho Technologies Company (LITCO) used a systems engineering approach to develop the first formal requirements baseline for Idaho National Engineering Laboratory (INEL) Environmental Management (EM) Programs. The recently signed Settlement Agreement with the State of Idaho (Batt Agreement), along with dramatically reduced EM funding targets from Department of Energy (DOE) headquarters, drove the immediacy of this effort. Programs have linked top-level requirements to work scope to cost estimates. All EM work, grouped by decision units, was scrubbed by INEL EM programs and by an independent {open_quotes}Murder Board.{close_quotes} Direct participation of upper level management from LITCO and the DOE-Idaho Operations Office ensured best information and decisions. The result is a scrubbed down, defensible budget tied to top-level requirements for use in the upcoming DOE-Headquarters` budget workout, the Internal Review Board, the FY98 Activity Data Sheets submittal, and preparation of the FY97 control accounts and out-year plans. In addition to the remarkable accomplishments during the past eight weeks, major issues were identified and documented and follow-on tasks are underway which will lead to further improvements in INEL EM program management.

  9. Modeling Vulnerability and Resilience to Climate Change: A Case Study of India and Indian States

    SciTech Connect (OSTI)

    Brenkert, Antoinette L.; Malone, Elizabeth L.

    2005-09-01

    The vulnerability of India and Indian states to climate change was assessed using the Vulnerability-Resilience Indicator Prototype (VRIP). The model was adapted from the global/country version to account for Indian dietary practices and data availability with regard to freshwater resources. Results (scaled to world values) show nine Indian states to be moderately resilient to climate change, principally because of low sulfur emissions and a relatively large percentage of unmanaged land. Six states are more vulnerable than India as a whole, attributable largely to sensitivity to sea storm surges. Analyses of results at the state level (Orissa, and comparisons between Maharashtra and Kerala, and Andhra Pradesh and Himachal Pradesh) demonstrate the value of VRIP analyses used in conjunction with other socioeconomic information to address initial questions about the sources of vulnerability in particular places. The modeling framework allows analysts and stakeholders to systematically evaluate individual and sets of indicators and to indicate where the likely vulnerabilities are in the area being assessed.

  10. Risk Identification and Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Risk Identification and Assessment [Sections in brackets are for instructions; these should be deleted or replaced with specifics in the template.] Subsystem Title or Section within Subsystem [In the first column, using short bullets, fill in "what can go wrong," or a brief description of a potential benefit from a program or action. Add additional rows as necessary. Fill in the other columns using the rating guidelines in the attached reference pages.] |Risk|Probability|Impact|Risk

  11. U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 38: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x

  12. PINS Spectrum Identification Guide

    SciTech Connect (OSTI)

    A.J. Caffrey

    2012-03-01

    The Portable Isotopic Neutron Spectroscopy—PINS, for short—system identifies the chemicals inside munitions and containers without opening them, a decided safety advantage if the fill chemical is a hazardous substance like a chemical warfare agent or an explosive. The PINS Spectrum Identification Guide is intended as a reference for technical professionals responsible for the interpretation of PINS gamma-ray spectra. The guide is divided into two parts. The three chapters that constitute Part I cover the science and technology of PINS. Neutron activation analysis is the focus of Chapter 1. Chapter 2 explores PINS hardware, software, and related operational issues. Gamma-ray spectral analysis basics are introduced in Chapter 3. The six chapters of Part II cover the identification of PINS spectra in detail. Like the PINS decision tree logic, these chapters are organized by chemical element: phosphorus-based chemicals, chlorine-based chemicals, etc. These descriptions of hazardous, toxic, and/or explosive chemicals conclude with a chapter on the identification of the inert chemicals, e.g. sand, used to fill practice munitions.

  13. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  14. Energy and Defense Departments Announce New Steps to Enhance Cooperation on

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Clean Energy and Energy Security | Department of Energy Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security Energy and Defense Departments Announce New Steps to Enhance Cooperation on Clean Energy and Energy Security March 2, 2011 - 12:00am Addthis Washington, D.C. - Building on already strong cooperation between the U.S. Department of Energy and the U.S. Department of Defense, U.S. Secretary of the Navy Ray Mabus announced today new steps

  15. Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework

    SciTech Connect (OSTI)

    Cappelli, M.; Gadomski, A. M.; Sepiellis, M.; Wronikowska, M. W.

    2012-07-01

    In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

  16. FIA-15-0029- In the Matter of Environmental Defense Institute

    Broader source: Energy.gov [DOE]

    On June 5, 2015, OHA denied a FOIA Appeal filed by Environmental Defense Institute from a determination issued to it by the DOE Idaho Operations Office (DOE-ID). In the Appeal, the Appellant...

  17. Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security and develop new clean...

  18. Departments of Energy, Defense Partner to Install Fuel Cell Backup Power Units at Eight Military Installations

    Broader source: Energy.gov [DOE]

    Washington, D.C. - The U.S. Department of Energy (DOE) today announced that as part of an interagency partnership with the U.S. Department of Defense (DOD) to strengthen American energy security...

  19. DOE Submits Its Defense-Related Uranium Mines Report to Congress

    Broader source: Energy.gov [DOE]

    Dr. Ernest Moniz, the U.S. Secretary of Energy, submitted the U.S. Department of Energy (DOE) Defense-Related Uranium Mines Report to Congress on September 2, 2014. Section 3151 of the National...

  20. Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting- October 2012

    Broader source: Energy.gov [DOE]

    Defense Nuclear Facilities Safety Board Public Meeting on the Status of Integration of Safety Into the Design of the Uranium Processing Facility [HIAR-Y-12-2012-10-02

  1. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Candy, J V 42 ENGINEERING; 73 NUCLEAR PHYSICS AND RADIATION PHYSICS Abstract not provided...

  2. Annotated bibliography for gas-mask and chemical-defense-gear related papers. Interim report

    SciTech Connect (OSTI)

    Kelly, T.L.; Sucec, A.A.; Englund, C.E.

    1988-01-15

    This is an annotated bibliography of papers that relate to the characteristics and effects of gas masks and other chemical-defense gear. Psychological, physiological, and cognitive performance effects are included.

  3. Legacy Management Work Progresses on Defense-Related Uranium Mines Report to Congress

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy Office of Legacy Management (LM) continues to work on a report to Congress regarding defense-related legacy uranium mines. LM was directed by the U.S. Congress in the...

  4. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site.

  5. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  6. Seismic Vulnerability Evaluations Within The Structural And Functional Survey Activities Of The COM Bases In Italy

    SciTech Connect (OSTI)

    Zuccaro, G.; Cacace, F.; Albanese, V.; Mercuri, C.; Papa, F.; Pizza, A. G.; Sergio, S.; Severino, M.

    2008-07-08

    The paper describes technical and functional surveys on COM buildings (Mixed Operative Centre). This activity started since 2005, with the contribution of both Italian Civil Protection Department and the Regions involved. The project aims to evaluate the efficiency of COM buildings, checking not only structural, architectonic and functional characteristics but also paying attention to surrounding real estate vulnerability, road network, railways, harbours, airports, area morphological and hydro-geological characteristics, hazardous activities, etc. The first survey was performed in eastern Sicily, before the European Civil Protection Exercise 'EUROSOT 2005'. Then, since 2006, a new survey campaign started in Abruzzo, Molise, Calabria and Puglia Regions. The more important issue of the activity was the vulnerability assessment. So this paper deals with a more refined vulnerability evaluation technique by means of the SAVE methodology, developed in the 1st task of SAVE project within the GNDT-DPC programme 2000-2002 (Zuccaro, 2005); the SAVE methodology has been already successfully employed in previous studies (i.e. school buildings intervention programme at national scale; list of strategic public buildings in Campania, Sicilia and Basilicata). In this paper, data elaborated by SAVE methodology are compared with expert evaluations derived from the direct inspections on COM buildings. This represents a useful exercise for the improvement either of the survey forms or of the methodology for the quick assessment of the vulnerability.

  7. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  8. The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief The Defense Logistics Agency, Hydrogen-Powered Forklift Test-Bed Brief This presentation by Leo Grassilli focuses on hydrogen-powered forklifts. PDF icon education_presentation_grassilli.pdf More Documents & Publications Hydrogen and Fuel Cell Activity State of the States: Fuel Cells in America 2012 U.S. Army Energy and Environmental Requirements and Goals: Opportunities for Fuel Cells and

  9. Microsoft Word - Defense Related Uranium Mines Report to Congress-FINAL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Defense- Related Uranium Mines Report to Congress August 2014 United States Department of Energy Washington, DC 20585 Message from the Secretary Section 3151 of the National Defense Authorization Act for Fiscal Year 2013 directed the Secretary of Energy, in consultation with the Secretary of the Interior and the Administrator of the U.S. Environmental Protection Agency (EPA), to undertake a review of, and prepare a report on, abandoned uranium mines in the United States that provided uranium ore

  10. Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based

    Office of Scientific and Technical Information (OSTI)

    Bayesian Approach (Conference) | SciTech Connect Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Authors: Candy, J V Publication Date: 2013-03-14 OSTI Identifier: 1084714 Report Number(s): LLNL-CONF-628912 DOE Contract Number: W-7405-ENG-48 Resource Type: Conference Resource Relation: Conference: Presented at: IEEE

  11. Pantex and Y-12 teams receive NNSA Defense Programs awards | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Pantex and Y-12 teams receive NNSA Defense Programs awards January 13, 2016 OAK RIDGE, Tenn. - 260 employees at the Pantex Plant and the Y-12 National Security Complex received National Nuclear Security Administration (NNSA) Defense Programs Awards of Excellence at an annual ceremony held recently at the respective sites. The recipients were recognized at the sites by members of site management as well as Steve Goodrum, NNSA Assistant Deputy Administrator for

  12. Y-12 and Pantex teams receive NNSA Defense Programs awards | Y-12 National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Complex and Pantex teams ... Y-12 and Pantex teams receive NNSA Defense Programs awards Posted: January 12, 2016 - 4:11pm 260 employees at the Pantex Plant and the Y-12 National Security Complex received National Nuclear Security Administration Defense Programs Awards of Excellence at an annual ceremony held recently at the respective sites. The recipients were recognized at the sites by members of site management as well as Steve Goodrum, NNSA Assistant Deputy Administrator for

  13. Energy Department to Loan Emergency Fuel to Department of Defense as Part

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Hurricane Sandy Response | Department of Energy to Loan Emergency Fuel to Department of Defense as Part of Hurricane Sandy Response Energy Department to Loan Emergency Fuel to Department of Defense as Part of Hurricane Sandy Response November 2, 2012 - 5:13pm Addthis NEWS MEDIA CONTACT (202) 586-4940 WASHINGTON - As part of the government-wide response and recovery effort for Hurricane Sandy, President Obama declared that Hurricane Sandy has created a severe energy supply interruption and

  14. Microsoft Word - Defense Science Quarterly - 2july09 - FINAL.doc

    National Nuclear Security Administration (NNSA)

    Summer 2009 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 Density Measurement Errors at DARHT - Quantifying a Decade of Progress 3 2nd Annual BoostFest 4 Nevada Test Site Awarded Prestigious Certificate of Accreditation for HEDP Calibration Labs 5 Update on the JASPER Program 6 Publication Highlights 7 Highlights from the Stewardship Science Graduate Fellowship Program 8 In Remembrance-Malcolm Nicol 8 Awards Message from the Director Chris Deeney, Defense Science

  15. Microsoft Word - Defense Science Quarterly 11-08 v2.doc

    National Nuclear Security Administration (NNSA)

    December 2008 Defense Science Quarterly Inside This Issue 1 Message from the Director 2 The National Boost Initiative 3 HEDP to Support Our Understanding of Radiation Flow 4 Publication Highlights 5 Awards and Highlights Message from the Director Chris Deeney, Defense Science Division It's been another productive year. I am so proud of the progress we have made this year - boost, DARHT, energy-balance, JASPER... The list is too long to go through. Thank you. My father had a simple piece of

  16. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    SciTech Connect (OSTI)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  17. Ethnicity and Race Identification | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ethnicity and Race Identification Ethnicity and Race Identification PDF icon Ethnicity and Race Identification More Documents & Publications DOE F 1600.7 Employee In-Processing Forms Office of Personnel Management (OPM) Guidance on Diversity and Inclusion

  18. PINS chemical identification software

    DOE Patents [OSTI]

    Caffrey, Augustine J.; Krebs, Kennth M.

    2004-09-14

    An apparatus and method for identifying a chemical compound. A neutron source delivers neutrons into the chemical compound. The nuclei of chemical elements constituting the chemical compound emit gamma rays upon interaction with the neutrons. The gamma rays are characteristic of the chemical elements constituting the chemical compound. A spectrum of the gamma rays is generated having a detection count and an energy scale. The energy scale is calibrated by comparing peaks in the spectrum to energies of pre-selected chemical elements in the spectrum. A least-squares fit completes the calibration. The chemical elements constituting the chemical compound can be readily determined, which then allows for identification of the chemical compound.

  19. Two Forms of Identification | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PDF icon Two Forms of Identification More Documents & Publications Self-Identification of Disability New Employee Orientation - Forms Checklist DOE Emergency Special Needs ...

  20. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions October 2015 U.S. Department of Energy Office of Energy Policy and Systems Analysis Acknowledgements This report was produced by the U.S. Department of Energy's Office of Energy Policy and Systems Analysis (DOE-EPSA) under the direction of Craig Zamuda. Matt Antes, C.W. Gillespie, Anna Mosby, and Beth Zotter of Energetics Incorporated provided analysis, drafting support, and technical editing.

  1. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2010-08-25

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future.

  2. Application of artificial neural networks in power system security and vulnerability assessment

    SciTech Connect (OSTI)

    Qin Zhou; Davidson, J.; Fouad, A.A.

    1994-02-01

    In a companion paper the concept of system vulnerability is introduced as a new framework for power system dynamic security assessment. Using the TEF method of transient stability analysis, the energy margin [Delta]V is used as an indicator of the level of security, and its sensitivity to a changing system parameter p ([partial derivative][Delta]V/[partial derivative]p) as indicator of its trend with changing system conditions. These two indicators are combined to determine the degree of system vulnerability to contingent disturbances in a stability-limited power system. Thresholds for acceptable levels of the security indicator and its trend are related to the stability limits of a critical system parameter (plant generation limits). Operating practices and policies are used to determine these thresholds. In this paper the artificial neural networks (ANNs) technique is applied to the concept of system vulnerability within the recently developed framework, for fast pattern recognition and classification of system dynamic security status. A suitable topology for the neural network is developed, and the appropriate training method and input and output signals are selected. The procedure developed is successfully applied to the IEEE 50-generator test system. Data previously obtained by heuristic techniques are used for training the ANN.

  3. Vulnerability and adaptation to severe weather events in the American southwest

    SciTech Connect (OSTI)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptation to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.

  4. Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?

    SciTech Connect (OSTI)

    Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

    2013-07-01

    Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

  5. Vulnerability and adaptation to severe weather events in the American southwest

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Boero, Riccardo; Bianchini, Laura; Pasqualini, Donatella

    2015-05-04

    Climate change can induce changes in the frequency of severe weather events representing a threat to socio-economic development. It is thus of uttermost importance to understand how the vulnerability to the weather of local communities is determined and how adaptation public policies can be effectively put in place. We focused our empirical analysis on the American Southwest. Results show that, consistently with the predictions of an investment model, economic characteristics signaling local economic growth in the near future decrease the level of vulnerability. We also show that federal governments transfers and grants neither work to support recovery from and adaptationmore » to weather events nor to distribute their costs over a broader tax base. Finally, we show that communities relying on municipal bonds to finance adaptation and recovery policies can benefit from local acknowledgment of the need for such policies and that they do not have to pay lenders a premium for the risk induced by weather events. In conclusion, our findings suggest that determinants of economic growth support lower vulnerability to the weather and increase options for financing adaptation and recovery policies, but also that only some communities are likely to benefit from those processes.« less

  6. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

  7. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    SciTech Connect (OSTI)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S.

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  8. Pileup per particle identification

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Bertolini, Daniele; Harris, Philip; Low, Matthew; Tran, Nhan

    2014-10-09

    We propose a new method for pileup mitigation by implementing “pileup per particle identification” (PUPPI). For each particle we first define a local shape ? which probes the collinear versus soft diffuse structure in the neighborhood of the particle. The former is indicative of particles originating from the hard scatter and the latter of particles originating from pileup interactions. The distribution of ? for charged pileup, assumed as a proxy for all pileup, is used on an event-by-event basis to calculate a weight for each particle. The weights describe the degree to which particles are pileup-like and are used tomore »rescale their four-momenta, superseding the need for jet-based corrections. Furthermore, the algorithm flexibly allows combination with other, possibly experimental, probabilistic information associated with particles such as vertexing and timing performance. We demonstrate the algorithm improves over existing methods by looking at jet pT and jet mass. We also find an improvement on non-jet quantities like missing transverse energy.« less

  9. Pileup per particle identification

    SciTech Connect (OSTI)

    Bertolini, Daniele; Harris, Philip; Low, Matthew; Tran, Nhan

    2014-10-09

    We propose a new method for pileup mitigation by implementing “pileup per particle identification” (PUPPI). For each particle we first define a local shape ? which probes the collinear versus soft diffuse structure in the neighborhood of the particle. The former is indicative of particles originating from the hard scatter and the latter of particles originating from pileup interactions. The distribution of ? for charged pileup, assumed as a proxy for all pileup, is used on an event-by-event basis to calculate a weight for each particle. The weights describe the degree to which particles are pileup-like and are used to rescale their four-momenta, superseding the need for jet-based corrections. Furthermore, the algorithm flexibly allows combination with other, possibly experimental, probabilistic information associated with particles such as vertexing and timing performance. We demonstrate the algorithm improves over existing methods by looking at jet pT and jet mass. We also find an improvement on non-jet quantities like missing transverse energy.

  10. Summary Protocol: Identification, Characterization, Designation, Remedial

    Energy Savers [EERE]

    Action, Certification | Department of Energy Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) PDF icon Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents &

  11. Agencies, Hoping to Deflect Comets and Asteroids, Step Up Earth Defense

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agencies, Hoping to Deflect Comets and Asteroids, Step Up Earth Defense Agencies, Hoping to Deflect Comets and Asteroids, Step Up Earth Defense In grappling with the threat of doomsday rocks from outer space, Hollywood has always been far ahead of the federal government, cranking out thrillers full of swashbuckling heroes, rockets and nuclear blasts that save the planet. June 26, 2015 A hole in the ice of a frozen lake near Chelyabinsk, Russia, in 2013 after a 7,000-ton meteoroid exploded over

  12. EVMS - FROM DATA TO DIAGNOSIS - A DoD Perspective - David Kester, Defense

    Energy Savers [EERE]

    Contract Management Agency | Department of Energy EVMS - FROM DATA TO DIAGNOSIS - A DoD Perspective - David Kester, Defense Contract Management Agency EVMS - FROM DATA TO DIAGNOSIS - A DoD Perspective - David Kester, Defense Contract Management Agency CONTENTS 1. DCMA At a Glance 2. Current EVMS Environment 3. The PM Connection 4. DCMA EVMS Mission Transformation 5. All Things Data 6. Mapping the EVMS Genome - EIA-748 Guideline 9 7. EVMAS - The Technology Solution 8. Role of the ACO in the

  13. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  14. EIS-0082-S1: Defense Waste Processing Facility, Savannah River Site, Aiken, South Carolina

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy developed this Supplemental Environmental Impact Statement to assess the potential environmental impacts of completing construction and operating the Defense Waste Processing Facility, a group of associated facilities and structures, to pretreat, immobilize, and store high-level radioactive waste at the Savannah River Site.

  15. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    SciTech Connect (OSTI)

    Not Available

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  16. Implementation of Section 1072 of the National Defense Authorization Act for Fiscal Year 2008

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-12

    This Notice provides guidance for implementing the mandates of Section 1072 of the National Defense Authorization Act for Fiscal Year 2008, commonly referred to as the Bond Amendment. Extended until 9-28-11 by DOE N 251.90 dated 9-28-10. Canceled by DOE O 472.2. Does not cancel other directives.

  17. Implementation of the Strategic Petroleum Reserve in the defense logistics agency. Final report

    SciTech Connect (OSTI)

    Holbrook, P.F.

    1981-07-01

    A brief synopsis of the impact of the 1973 Arab oil embargo on the economy and people of the United States is presented together with organizational problems that faced the Department of Energy in implementing the Strategic Petroleum Reserve. A review of the involvement of the Defense Logistics Agency in support of the reserve is presented from a budgetary and financial viewpoint.

  18. U.S. Department of Defense Third-Party Financing Authorities

    Broader source: Energy.gov [DOE]

    Presentation—given at the Fall 2011 Federal Utility Partnership Working Group (FUPWG) meeting—covers the U.S. Department of Defense's (DoDs) purchase power agreements (PPAs), enhanced use leases (EULs), energy savings performance contracts (ESPCs), and utility energy service contracts (UESCs).

  19. Concealed identification symbols and nondestructive determination of the identification symbols

    DOE Patents [OSTI]

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  20. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect (OSTI)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  1. Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico

    SciTech Connect (OSTI)

    Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

    2008-12-30

    Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

  2. Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid

    SciTech Connect (OSTI)

    Pinar, A.; Meza, J.; Donde, V.; Lesieutre, B.

    2007-11-13

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (MINLP) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  3. Optimization strategies for the vulnerability analysis of the electric power grid.

    SciTech Connect (OSTI)

    Meza, Juan C.; Pinar, Ali; Lesieutre, Bernard; Donde, Vaibhav

    2009-03-01

    Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a mixed integer nonlinear programming (minlp) problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 10,000 power lines.

  4. Identification of synchronous machine parameters

    SciTech Connect (OSTI)

    Shaban, A.O.

    1985-01-01

    The synchronous machine is an essential component of a power system and determination of its parameters accurately is an important task in securing adequate modes of operation through certain control strategies. An estimation technique based on the Powell algorithm was evaluated for the identification of these parameters on the basis of small-signal input-output data. A fifth order Park domain flux linkage model of a salient pole machine was used for the identification of the parameters. Stator terminal voltages as transformed into the Park domain, field voltage and rotor frequency were used as input signals to the model. The input signals to the actual machine are the stator terminal voltages and the field voltage. The Park domain stator terminal current and field current were used as output signals. Due to the lack of access to real data, digital simulation of an actual machine as used in an effort to establish the machine responses in the time domain to small changes in the input signals. These responses were compared with those obtained from the model with the unknown parameters and utilized in the identification process. The sensitivity of a least-square loss-function with respect to each parameter was tested. The proposed parameter identification method was evaluated with data of two different machines. Careful observation of the results indicates that convergence can only be secured if nonsimultaneous perturbation of the direct - and quadrature - axis components of the terminal voltages is applied.

  5. Multi-service briefing on radioisotope systems for defense applications, briefing notes and supporting information

    SciTech Connect (OSTI)

    Jarrett, J.H.; Tingey, G.L.

    1990-05-01

    A briefing on isotope systems technology and applications was held at the Pentagon on 9 May 1990, cosponsored by the Department of Defense and the Department of Energy. The objective was to provide isotope systems information to interested individuals and offices from the DOD and the Services, and then to discuss potential uses of this technology within the defense community. Presentations were given on the useful characteristics of radioactive decay, isotope sources, properties of specific isotopes, and details of isotope systems that have been deployed for terrestrial and space applications. Application areas covered included: electrical, thermal and mechanical energy conversion systems; radiation applications; and radioluminescent lights. Talks were also given on system licensing and approvals, and conclusions from the 1986 workshop on isotope systems applications. This document contains the meeting agenda, copies of the vu-graphs used in the presentations, face sheets given to meeting attendees, a list of attendees, and supplementary information requested during the meeting.

  6. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    SciTech Connect (OSTI)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  7. Joint probability safety assessment for NPP defense infrastructure against extreme external natural hazards

    SciTech Connect (OSTI)

    Guilin, L.; Defu, L.; Huajun, L.; Fengqing, W.; Tao, Z.

    2012-07-01

    With the increasing tendency of natural hazards, the typhoon, hurricane and tropical Cyclone induced surge, wave, precipitation, flood and wind as extreme external loads menacing Nuclear Power Plants (NPP) in coastal and inland provinces of China. For all of planned, designed And constructed NPP the National Nuclear Safety Administration of China and IAEA recommended Probable Maximum Hurricane /Typhoon/(PMH/T), Probable Maximum Storm Surge (PMSS), Probable Maximum Flood (PMF), Design Basis Flood (DBF) as safety regulations for NPP defense infrastructures. This paper discusses the joint probability analysis of simultaneous occurrence typhoon induced extreme external hazards and compare with IAEA 2006-2009 recommended safety regulation design criteria for some NPP defense infrastructures along China coast. (authors)

  8. Progress of the High Level Waste Program at the Defense Waste Processing Facility - 13178

    SciTech Connect (OSTI)

    Bricker, Jonathan M.; Fellinger, Terri L.; Staub, Aaron V.; Ray, Jeff W.; Iaukea, John F. [Savannah River Remediation, Aiken, South Carolina, 29808 (United States)] [Savannah River Remediation, Aiken, South Carolina, 29808 (United States)

    2013-07-01

    The Defense Waste Processing Facility at the Savannah River Site treats and immobilizes High Level Waste into a durable borosilicate glass for safe, permanent storage. The High Level Waste program significantly reduces environmental risks associated with the storage of radioactive waste from legacy efforts to separate fissionable nuclear material from irradiated targets and fuels. In an effort to support the disposition of radioactive waste and accelerate tank closure at the Savannah River Site, the Defense Waste Processing Facility recently implemented facility and flowsheet modifications to improve production by 25%. These improvements, while low in cost, translated to record facility production in fiscal years 2011 and 2012. In addition, significant progress has been accomplished on longer term projects aimed at simplifying and expanding the flexibility of the existing flowsheet in order to accommodate future processing needs and goals. (authors)

  9. Improving Photoelectron Counting and Particle Identification in

    Office of Scientific and Technical Information (OSTI)

    Scintillation Detectors with Bayesian Techniques (Journal Article) | SciTech Connect Improving Photoelectron Counting and Particle Identification in Scintillation Detectors with Bayesian Techniques Citation Details In-Document Search Title: Improving Photoelectron Counting and Particle Identification in Scintillation Detectors with Bayesian Techniques Improving Photoelectron Counting and Particle Identification in Scintillation Detectors with Bayesian Techniques article submitted to

  10. defense programs

    National Nuclear Security Administration (NNSA)

    reaching approximately 100 billion Joules per cubic meter (the energy density of a hydrogen molecule) corresponding to a pressure of approximately 1 Mbar.  Free electrons...

  11. defense programs

    National Nuclear Security Administration (NNSA)

    in size from a pinhead to a small pea, is filled with a mixture of two isotopes of hydrogen (deuterium (D) and tritium (T)) and is subjected to a sudden application of intense...

  12. General Technical Base Qualification Standard (DOE Defense Nuclear Facilities Technical Personnel)

    Energy Savers [EERE]

    DOE-STD-1146-2007 December 2007 DOE STANDARD GENERAL TECHNICAL BASE QUALIFICATION STANDARD DOE Defense Nuclear Facilities Technical Personnel U.S. Department of Energy AREA TRNG Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1146-2007 ii This document is available on the Department of Energy Technical Standards Program Web Site at http://www.hss.energy.gov/nuclearsafety/techstds/ DOE-STD-1146-2007 iv INTENTIONALLY BLANK

  13. Defense Program Awards of Excellence: Y-12 Uranium Mission Strategy Team |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Defense Nuclear Nonproliferation Dedication of Radioactive Source Storage Facilities in Tajikistan (Dushanbe, Tajikistan) - On May 11, the United States' Embassy of Tajikistan, the Department of Energy/National Nuclear Security Administration (DOE/NNSA), the United Kingdom's Department of Energy and Climate Change (DECC), and the Government of Tajikistan dedicated two... United States Collaborates with Switzerland to Remove Last Remaining Separated Plutonium (WASHINGTON, D.C.) - The Department

  14. Statement of Dr. Donald L. Cook Deputy Administrator for Defense Programs

    National Nuclear Security Administration (NNSA)

    Statement of Dr. Donald L. Cook Deputy Administrator for Defense Programs National Nuclear Security Administration U.S. Department of Energy On the B61 Life Extension Program and Future Stockpile Strategy Before the Subcommittee on Strategic Forces House Committee on Armed Services Introduction Chairman Rogers, Ranking Member Cooper and distinguished members of the Subcommittee, thank you for having me here to discuss the President's plans for nuclear weapon modernization focused on the B61 Life

  15. June 2014 Most Viewed Documents for National Defense | OSTI, US Dept of

    Office of Scientific and Technical Information (OSTI)

    Energy, Office of Scientific and Technical Information June 2014 Most Viewed Documents for National Defense Science Subject Feed The Effects of Nuclear Weapons Glasstone, Samuel (1964) 71 /> Penetration equations Young, C.W. [Applied Research Associates, Inc., Albuquerque, NM (United States)] (1997) 29 /> Manual for the prediction of blast and fragment loadings on structures Not Available (1980) 29 /> Specific heat and thermal conductivity of explosives, mixtures, and plastic-bonded

  16. Most Viewed Documents for National Defense: December 2014 | OSTI, US Dept

    Office of Scientific and Technical Information (OSTI)

    of Energy, Office of Scientific and Technical Information Most Viewed Documents for National Defense: December 2014 A survey of combustible metals, thermites, and intermetallics for pyrotechnic applications Fischer, S.H.; Grubelich, M.C. (1996) 53 Precision linear shaped charge analyses for severance of metals Vigil, M.G. (1996) 36 Comments on TNT Equivalence Cooper, P.W. (1994) 32 Specific heat and thermal conductivity of explosives, mixtures, and plastic-bonded explosives determined

  17. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    SciTech Connect (OSTI)

    Vogel, J.; O'Grady, M.; Renfrow, S.

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  18. Groundwaters of Florence (Italy): Trace element distribution and vulnerability of the aquifers

    SciTech Connect (OSTI)

    Bencini, A.; Ercolanelli, R.; Sbaragli, A.

    1993-11-01

    Geochemical and hydrogeological research has been carried out in Florence, to evaluate conductivity and main chemistry of groundwaters, the pattern of some possible pollutant chemical species (Fe, Mn, Cr, Cu, Pb, Zn, NO{sub 2}, NO{sub 3}), and the vulnerability of the aquifers. The plain is made up of Plio-Quaternary alluvial and lacustrine sediments for a maximum thickness of 600 m. Silts and clays, sometimes with lenses of sandy gravels, are dominant, while considerable deposits of sands, pebbles, and gravels occur along the course of the Arno river and its tributary streams, and represent the most important aquifer of the plain. Most waters show conductivity values around 1000-1200 {mu}S, and almost all of them have an alkaline-earth-bicarbonate chemical character. In western areas higher salt content of the groundwaters is evident. Heavy metal and NO{sub 2}, NO{sub 3} analyses point out that no important pollution phenomena affect the groundwaters; all mean values are below the maximum admissible concentration (MAC) for drinkable waters. Some anomalies of NO{sub 2}, NO{sub 3}, Fe, Mn, and Zn are present. The most plausible causes can be recognized in losses of the sewage system; use of nitrate compounds in agriculture; oxidation of well pipes. All the observations of Cr, Cu, and Pb are below the MAC; the median values of <3, 3.9, and 1.1 {mu}g/l, respectively, could be considered reference concentrations for groundwaters in calcareous lithotypes, under undisturbed natural conditions. Finally, a map of vulnerability shows that the areas near the Arno river are highly vulnerable, for the minimum thickness (or lacking) of sediments covering the aquifer. On the other hand, in the case of pollution, several factors not considered could significantly increase the self-purification capacity of the aquifer, such asdilution of groundwaters, bacteria oxidation of nitrogenous species, and sorption capacity of clay minerals and organic matter. 31 refs., 6 figs., 5 tabs.

  19. Vulnerability of Karangkates dams area by means of zero crossing analysis of data magnetic

    SciTech Connect (OSTI)

    Sunaryo, E-mail: sunaryo.geofis.ub@gmail.com; Susilo, Adi

    2015-04-24

    Study with entitled Vulnerability Karangkates Dam Area By Means of Zero Crossing Analysis of Data Magnetic has been done. The study was aimed to obtain information on the vulnerability of two parts area of Karangkates dams, i.e. Lahor dam which was inaugurated in 1977 and Sutami dam inaugurated in 1981. Three important things reasons for this study are: 1). The dam age was 36 years old for Lahor dam and 32 years old for Sutami dam, 2). Geologically, the location of the dams are closed together to the Pohgajih local shear fault, Selorejo local fault, and Selorejo limestone-andesite rocks contact plane, and 3). Karangkates dams is one of the important Hydro Power Plant PLTA with the generating power of about 400 million KWH per year from a total of about 29.373MW installed in Indonesia. Geographically, the magnetic data acquisition was conducted at coordinates (112.4149oE;-8.2028oS) to (112.4839oE;-8.0989oS) by using Proton Precession Magnetometer G-856. Magnetic Data acquisition was conducted in the radial direction from the dams with diameter of about 10 km and the distance between the measurements about 500m. The magnetic data acquisition obtained the distribution of total magnetic field value in the range of 45800 nT to 44450 nT. Residual anomalies obtained by doing some corrections, including diurnal correction, International Geomagnetic Reference Field (IGRF) correction, and reductions so carried out the distribution of the total magnetic field value in the range of -650 nT to 700 nT. Based on the residual anomalies, indicate the presence of 2 zones of closed closures dipole pairs at located in the west of the Sutami dam and the northwest of the Lahor dam from 5 total zones. Overlapping on the local geological map indicated the lineament of zero crossing patterns in the contour of residual anomaly contour with the Pohgajih shear fault where located at about 4 km to the west of the Sutami dam approximately and andesite-limestone rocks contact where located at about 6 km to the west of the Lahor dam approximately. These shown a possible of vulnerability on geohazards at the west zone of the Karangkates (Lahor-Sutami) dams area if there are triggers by the vibration (earthquake) on the Pohgajih shear fault, andesite-limestone contact plane, and instability rocks on two zones of closed closure dipole pairs area. Reality, on the location of the study shown some local landslide at the several locations and the main road that need considering for disaster mitigation.

  20. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    SciTech Connect (OSTI)

    Fink, Glenn A.; Oehmen, Christopher S.

    2012-09-01

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.

  1. Similarities of host defense mechanisms against pulmonary infectious disease in animals and man

    SciTech Connect (OSTI)

    Green, G.M.

    1984-01-01

    Evidence linking exposure to air pollutants with increased susceptibility to infectious diseases in humans comes from epidemiological, clinical, and experimental laboratory studies. The data suggest that the most common, and perhaps the most sensitive, index of the pulmonary effect of air pollutant exposure is on post upper respiratory infection, prolonged cough, phlegm, and purulent sputum. Experimental models of these relationships for extrapolation to humans should be able to measure such minor changes in symptomatology and physiology rather than require major lethal events. The bacterial aerosol model for quantifying nonspecific defense mechanisms of the bronchopulmonary tree utilizing nonpathogenic organisms fulfills this criterion. The function of the six major components of pulmonary antimicrobial defense mechanisms - including aerodynamic filtration, secretory respiratory tract fluid, fluid transport at the alveolar and bronchial levels, the phagocytic function of alveolar macrophages, the augmenting mechanisms of blood-derived inflammatory cells, and the secretory and cellular-specific immune mechanisms and their mediator products - can all be quantified by this experimental animal model system. The defensive functions are remarkably similar across animal species, and available human data suggest that findings obtained using the model may be extrapolatred to humans.

  2. CHARACTERIZATION OF A PRECIPITATE REACTOR FEED TANK (PRFT) SAMPLE FROM THE DEFENSE WASTE PROCESSING FACILITY (DWPF)

    SciTech Connect (OSTI)

    Crawford, C.; Bannochie, C.

    2014-05-12

    A sample of from the Defense Waste Processing Facility (DWPF) Precipitate Reactor Feed Tank (PRFT) was pulled and sent to the Savannah River National Laboratory (SRNL) in June of 2013. The PRFT in DWPF receives Actinide Removal Process (ARP)/ Monosodium Titanate (MST) material from the 512-S Facility via the 511-S Facility. This 2.2 L sample was to be used in small-scale DWPF chemical process cell testing in the Shielded Cells Facility of SRNL. A 1L sub-sample portion was characterized to determine the physical properties such as weight percent solids, density, particle size distribution and crystalline phase identification. Further chemical analysis of the PRFT filtrate and dissolved slurry included metals and anions as well as carbon and base analysis. This technical report describes the characterization and analysis of the PRFT sample from DWPF. At SRNL, the 2.2 L PRFT sample was composited from eleven separate samples received from DWPF. The visible solids were observed to be relatively quick settling which allowed for the rinsing of the original shipping vials with PRFT supernate on the same day as compositing. Most analyses were performed in triplicate except for particle size distribution (PSD), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM) and thermogravimetric analysis (TGA). PRFT slurry samples were dissolved using a mixed HNO3/HF acid for subsequent Inductively Coupled Plasma Atomic Emission Spectroscopy (ICPAES) and Inductively Coupled Plasma Mass Spectroscopy (ICP-MS) analyses performed by SRNL Analytical Development (AD). Per the task request for this work, analysis of the PRFT slurry and filtrate for metals, anions, carbon and base were primarily performed to support the planned chemical process cell testing and to provide additional component concentrations in addition to the limited data available from DWPF. Analysis of the insoluble solids portion of the PRFT slurry was aimed at detailed characterization of these solids (TGA, PSD, XRD and SEM) in support of the Salt IPT chemistry team. The overall conclusions from analyses performed in this study are that the PRFT slurry consists of 0.61 Wt.% insoluble MST solids suspended in a 0.77 M [Na+] caustic solution containing various anions such as nitrate, nitrite, sulfate, carbonate and oxalate. The corresponding measured sulfur level in the PRFT slurry, a critical element for determining how much of the PRFT slurry gets blended into the SRAT, is 0.437 Wt.% TS. The PRFT slurry does not contain insoluble oxalates nor significant quantities of high activity sludge solids. The lack of sludge solids has been alluded to by the Salt IPT chemistry team in citing that the mixing pump has been removed from Tank 49H, the feed tank to ARP-MCU, thus allowing the sludge solids to settle out. ? The PRFT aqueous slurry from DWPF was found to contain 5.96 Wt.% total dried solids. Of these total dried solids, relatively low levels of insoluble solids (0.61 Wt.%) were measured. The densities of both the filtrate and slurry were 1.05 g/mL. ? Particle size distribution of the PRFT solids in filtered caustic simulant and XRD analysis of washed/dried PRFT solids indicate that the PRFT slurry contains a bimodal distribution of particles in the range of 1 and 6 ?m and that the particles contain sodium titanium oxide hydroxide Na2Ti2O4(OH)2 crystalline material as determined by XRD. These data are in excellent agreement with similar data obtained from laboratory sampling of vendor supplied MST. Scanning Electron Microscopy (SEM) combined with Energy Dispersive X-ray Spectroscopy (EDS) analysis of washed/dried PRFT solids shows the particles to be like previous MST analyses consisting of irregular shaped micron-sized solids consisting primarily of Na and Ti. ? Thermogravimetric analysis of the washed and unwashed PRFT solids shows that the washed solids are very similar to MST solids. The TGA mass loss signal for the unwashed solids shows similar features to TGA performed on cellulose nitrate filter paper indicating significant presence of the deteriorated filter

  3. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect (OSTI)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  4. High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7

    SciTech Connect (OSTI)

    Not Available

    1994-04-01

    This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining the facility and executing the mission of the High-Level Waste Storage Tank Farms.

  5. EIS-0113: Disposal of Hanford Defense High-Level, Transuranic and Tank Waste, Hanford Site, Richland, Washington

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy developed this EIS to examine the potential environmental impacts of final disposal options for legacy and future radioactive defense wastes stored at the Hanford Site.

  6. March 2016 Most Viewed Documents for National Defense | OSTI, US Dept of

    Office of Scientific and Technical Information (OSTI)

    Energy, Office of Scientific and Technical Information March 2016 Most Viewed Documents for National Defense SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 201 Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) 143 Comments on TNT Equivalence Cooper, P.W. (1994) 135 LLNL small-scale drop-hammer impact sensitivity test

  7. April 2013 Most Viewed Documents for National Defense | OSTI, US Dept of

    Office of Scientific and Technical Information (OSTI)

    Energy, Office of Scientific and Technical Information April 2013 Most Viewed Documents for National Defense Science Subject Feed Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) 95 /> SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 69 /> LLNL small-scale drop-hammer impact sensitivity test Simpson, L.R.; Foltz,

  8. LysM receptor-like kinases to improve plant defense response against fungal pathogens

    DOE Patents [OSTI]

    Wan, Jinrong; Stacey, Gary; Stacey, Minviluz; Zhang, Xuecheng

    2013-10-15

    Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens.

  9. LysM receptor-like kinases to improve plant defense response against fungal pathogens

    DOE Patents [OSTI]

    Wan, Jinrong; Stacey, Gary; Stacey, Minviluz; Zhang, Xuecheng

    2012-01-17

    Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens.

  10. Tank 42 sludge-only process development for the Defense Waste Processing Facility (DWPF)

    SciTech Connect (OSTI)

    Lambert, D.P.

    2000-03-22

    Defense Waste Processing Facility (DWPF) requested the development of a sludge-only process for Tank 42 sludge since at the current processing rate, the Tank 51 sludge has been projected to be depleted as early as August 1998. Testing was completed using a non-radioactive Tank 42 sludge simulant. The testing was completed under a range of operating conditions, including worst case conditions, to develop the processing conditions for radioactive Tank 42 sludge. The existing Tank 51 sludge-only process is adequate with the exception that 10 percent additional acid is recommended during sludge receipt and adjustment tank (SRAT) processing to ensure adequate destruction of nitrite during the SRAT cycle.

  11. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    SciTech Connect (OSTI)

    G. Radulesscu; J.S. Tang

    2000-06-07

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable canisters. The intended use of this analysis is to support Site Recommendation reports and to assist in the development of WPD drawings. Activities described in this analysis were conducted in accordance with the Development Plan ''Design Analysis for the Defense High-Level Waste Disposal Container'' (CRWMS M&O 2000c) with no deviations from the plan.

  12. What is the current state of the science of Cyber defense?

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-10-09

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward this end are emerging.

  13. September 2013 Most Viewed Documents for National Defense | OSTI, US Dept

    Office of Scientific and Technical Information (OSTI)

    of Energy, Office of Scientific and Technical Information September 2013 Most Viewed Documents for National Defense Science Subject Feed SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 34 /> Left-Wing Extremism: The Current Threat Karl A. Seger (2001) 28 /> The Elusive Coefficients of Thermal Expansion in PBX 9502 C.B. Skidmore; T.A. Butler; C.W. Sandoval (2003) 28 />

  14. September 2015 Most Viewed Documents for National Defense | OSTI, US Dept

    Office of Scientific and Technical Information (OSTI)

    of Energy, Office of Scientific and Technical Information September 2015 Most Viewed Documents for National Defense SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 131 Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) 91 Smart bridge: a tool for estimating the military load classification of bridges Van Groningen, C.N.;

  15. January 2013 Most Viewed Documents for National Defense | OSTI, US Dept of

    Office of Scientific and Technical Information (OSTI)

    Energy, Office of Scientific and Technical Information January 2013 Most Viewed Documents for National Defense Dynamic equation of state and strength properties of unreacted PBXW-128 explosive Chhabildas, L.C.; Grady, D.E.; Reinhart, W.D.; Wilson, L.T. From separations to reconstitution - a short history of Plutonium in the U.S. and Russia Gray, L W Condensation induced water hammer safety Gintner, M.A. Direct calibration of the yield of nuclear explosion Nakanishi, K.; Nikolayev, A.

  16. Most Viewed Documents for National Defense: September 2014 | OSTI, US Dept

    Office of Scientific and Technical Information (OSTI)

    of Energy, Office of Scientific and Technical Information for National Defense: September 2014 SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 47 Comments on TNT Equivalence Cooper, P.W. (1994) 31 LLNL small-scale drop-hammer impact sensitivity test Simpson, L.R.; Foltz, M.F. (1995) 29 A survey of combustible metals, thermites, and intermetallics for pyrotechnic applications Fischer,

  17. December 2015 Most Viewed Documents for National Defense | OSTI, US Dept of

    Office of Scientific and Technical Information (OSTI)

    Energy, Office of Scientific and Technical Information December 2015 Most Viewed Documents for National Defense SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 113 Comments on TNT Equivalence Cooper, P.W. (1994) 98 Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) 82 The future of components for high reliability

  18. Muon Reconstruction and Identification in CMS

    SciTech Connect (OSTI)

    Everett, A.

    2010-02-10

    We present the design strategies and status of the CMS muon reconstruction and identification identification software. Muon reconstruction and identification is accomplished through a variety of complementary algorithms. The CMS muon reconstruction software is based on a Kalman filter technique and reconstructs muons in the standalone muon system, using information from all three types of muon detectors, and links the resulting muon tracks with tracks reconstructed in the silicon tracker. In addition, a muon identification algorithm has been developed which tries to identify muons with high efficiency while maintaining a low probability of misidentification. The muon identification algorithm is complementary by design to the muon reconstruction algorithm that starts track reconstruction in the muon detectors. The identification algorithm accepts reconstructed tracks from the inner tracker and attempts to quantify the muon compatibility for each track using associated calorimeter and muon detector hit information. The performance status is based on detailed detector simulations as well as initial studies using cosmic muon data.

  19. S. 936: A Bill to authorize appropriations for fiscal year 1998 for military activities of the Department of Defense, for military construction, and for defense activities of the Department of Energy, to prescribe personnel strengths for such fiscal year for the Armed Forces, and for other purposes. Introduced in the Senate of the United States, One Hundred Fifth Congress, First session

    SciTech Connect (OSTI)

    1997-12-31

    This report discusses a bill that may be cited as the National Defense Authorization Act for fiscal year 1998.

  20. Identification and characterization of a nuclear localization...

    Office of Scientific and Technical Information (OSTI)

    of a nuclear localization signal of TRIM28 that overlaps with the HP1 box Citation Details In-Document Search Title: Identification and characterization of a nuclear ...

  1. Project Financing: From Identification to Implementation | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PDF icon Project Financing: From Identification to Implementation (April 16, 2009) More Documents & Publications Project Reports for Sac and Fox Tribe of the Mississippi in Iowa - ...

  2. Identification of Export Control Classification Number - ITER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Identification of Export Control Classification Number - ITER (April 2012) As the "Shipper of Record" please provide the appropriate Export Control Classification Number (ECCN) for...

  3. Identification of Hazards, 3/9/95

    Broader source: Energy.gov [DOE]

    The objective of this surveillance is to evaluate the effectiveness of the contractor's hazards identification programs.  Surveillance activities encompass maintenance and implementation of safety...

  4. Vulnerabilities and Opportunities at the Nexus of Electricity, Water and Climate

    SciTech Connect (OSTI)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-01

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warming that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.

  5. Vulnerabilities and Opportunities at the Nexus of Electricity, Water and Climate

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Frumhoff, Peter C.; Burkett, Virginia; Jackson, Robert B.; Newmark, Robin; Overpeck, Jonathan; Webber, Michael

    2015-08-01

    The articles in this special issue examine the critical nexus of electricity, water, and climate, emphasizing connections among resources; the prospect of increasing vulnerabilities of water resources and electricity generation in a changing climate; and the opportunities for research to inform integrated energy and water policy and management measures aimed at increasing resilience. Here, we characterize several major themes emerging from this research and highlight some of the uptake of this work in both scientific and public spheres. Underpinning much of this research is the recognition that water resources are expected to undergo substantial changes based on the global warmingmore » that results primarily from fossil energy-based carbon emissions. At the same time, the production of electricity from fossil fuels, nuclear power, and some renewable technologies (biomass, geothermal and concentrating solar power) can be highly water-intensive. Energy choices now and in the near future will have a major impact not just on the global climate, but also on water supplies and the resilience of energy systems that currently depend heavily on them.« less

  6. International technology exchange in support of the Defense Waste Processing Facility wasteform production

    SciTech Connect (OSTI)

    Kitchen, B.G.

    1989-08-23

    The nearly completed Defense Waste Processing Facility (DWPF) is a Department of Energy (DOE) facility at the Savannah River Site that is designed to immobilize defense high level radioactive waste (HLW) by vitrification in borosilicate glass and containment in stainless steel canisters suitable for storage in the future DOE HLW repository. The DWPF is expected to start cold operation later this year (1990), and will be the first full scale vitrification facility operating in the United States, and the largest in the world. The DOE has been coordinating technology transfer and exchange on issues relating to HLW treatment and disposal through bi-lateral agreements with several nations. For the nearly fifteen years of the vitrification program at Savannah River Laboratory, over two hundred exchanges have been conducted with a dozen international agencies involving about five-hundred foreign national specialists. These international exchanges have been beneficial to the DOE`s waste management efforts through confirmation of the choice of the waste form, enhanced understanding of melter operating phenomena, support for paths forward in political/regulatory arenas, confirmation of costs for waste form compliance programs, and establishing the need for enhancements of melter facility designs. This paper will compare designs and schedules of the international vitrification programs, and will discuss technical areas where the exchanges have provided data that have confirmed and aided US research and development efforts, impacted the design of the DWPF and guided the planning for regulatory interaction and product acceptance.

  7. International technology exchange in support of the Defense Waste Processing Facility wasteform production

    SciTech Connect (OSTI)

    Kitchen, B.G.

    1989-08-23

    The nearly completed Defense Waste Processing Facility (DWPF) is a Department of Energy (DOE) facility at the Savannah River Site that is designed to immobilize defense high level radioactive waste (HLW) by vitrification in borosilicate glass and containment in stainless steel canisters suitable for storage in the future DOE HLW repository. The DWPF is expected to start cold operation later this year (1990), and will be the first full scale vitrification facility operating in the United States, and the largest in the world. The DOE has been coordinating technology transfer and exchange on issues relating to HLW treatment and disposal through bi-lateral agreements with several nations. For the nearly fifteen years of the vitrification program at Savannah River Laboratory, over two hundred exchanges have been conducted with a dozen international agencies involving about five-hundred foreign national specialists. These international exchanges have been beneficial to the DOE's waste management efforts through confirmation of the choice of the waste form, enhanced understanding of melter operating phenomena, support for paths forward in political/regulatory arenas, confirmation of costs for waste form compliance programs, and establishing the need for enhancements of melter facility designs. This paper will compare designs and schedules of the international vitrification programs, and will discuss technical areas where the exchanges have provided data that have confirmed and aided US research and development efforts, impacted the design of the DWPF and guided the planning for regulatory interaction and product acceptance.

  8. Defense-in-Depth, How Department of Energy Implements Radiation Protection in Low Level Waste Disposal

    Broader source: Energy.gov [DOE]

    Defense-in-Depth, How Department of Energy Implements Radiation Protection in Low Level Waste Disposal Linda Suttora*, U.S. Department of Energy ; Andrew Wallo, U.S. Department of Energy Abstract: The United States Department of Energy (DOE) has adopted an integrated protection system for the safety of radioactive waste disposal similar to the concept of a safety case that is used internationally. This approach has evolved and been continuously improved as a result of many years of experience managing low-level waste (LLW) and mixed LLW from on-going operations, decommissioning and environmental restoration activities at 29 sites around the United States. The integrated protection system is implemented using a defense-in-depth approach taking into account the combination of natural and engineered barriers, performance objectives, long-term risk assessments, maintenance of those assessments based on the most recent information to ascertain continued compliance, site-specific waste acceptance criteria based on the risk assessment and a commitment to continuous improvement. There is also a strong component of stakeholder involvement. The integrated protection system approach will be discussed to demonstrate the commitment to safety for US DOE disposal.

  9. DWPF (Defense Waste Processing Facility) canister impact testing and analyses for the Transportation Technology Center

    SciTech Connect (OSTI)

    Farnsworth, R.K.; Mishima, J.

    1988-12-01

    A legal weight truck cask design has been developed for the US Department of Energy by GA Technologies, Inc. The cask will be used to transport defense high-level waste canisters produced by the Defense Waste Processing Facility (DWPF) at the Savannah River Plant. The development of the cask required the collection of impact data for the DWPF canisters. The Materials Characterization Center (MCC) performed this work under the guidance of the Transportation Technology Center (TTC) at Sandia National Laboratories. Two full-scale DWPF canisters filled with nonradioactive borosilicate glass were impacted under ''normal'' and ''hypothetical'' accident conditions. Two canisters, supplied by the DWPF, were tested. Each canister was vertically dropped on the bottom end from a height of either 0.3 m or 9.1 m (for normal or hypothetical accident conditions, respectively). The structural integrity of each canister was then examined using helium leak and dye penetrant testing. The canisters' diameters and heights, which had been previously measured, were then remeasured to determine how the canister dimensions had changed. Following structural integrity testing, the canisters were flaw leak tested. For transportation flaw leak testing, four holes were fabricated into the shell of canister A-27 (0.3 m drop height). The canister was then transported a total distance of 2069 miles. During transport, the waste form material that fell from each flaw was collected to determine the amount of size distribution of each flaw release. 2 refs., 8 figs., 12 tabs.

  10. Alternate approaches to verifying the structural adequacy of the Defense High Level Waste Shipping Cask

    SciTech Connect (OSTI)

    Zimmer, A.; Koploy, M.

    1991-12-01

    In the early 1980s, the US Department of Energy/Defense Programs (DOE/DP) initiated a project to develop a safe and efficient transportation system for defense high level waste (DHLW). A long-standing objective of the DHLW transportation project is to develop a truck cask that represents the leading edge of cask technology as well as one that fully complies with all applicable DOE, Nuclear Regulatory Commission (NRC), and Department of Transportation (DOT) regulations. General Atomics (GA) designed the DHLW Truck Shipping Cask using state-of-the-art analytical techniques verified by model testing performed by Sandia National Laboratories (SNL). The analytical techniques include two approaches, inelastic analysis and elastic analysis. This topical report presents the results of the two analytical approaches and the model testing results. The purpose of this work is to show that there are two viable analytical alternatives to verify the structural adequacy of a Type B package and to obtain an NRC license. It addition, this data will help to support the future acceptance by the NRC of inelastic analysis as a tool in packaging design and licensing.

  11. Terminating Safeguards on Excess Special Nuclear Material: Defense TRU Waste Clean-up and Nonproliferation - 12426

    SciTech Connect (OSTI)

    Hayes, Timothy; Nelson, Roger

    2012-07-01

    The Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) manages defense nuclear material that has been determined to be excess to programmatic needs and declared waste. When these wastes contain plutonium, they almost always meet the definition of defense transuranic (TRU) waste and are thus eligible for disposal at the Waste Isolation Pilot Plant (WIPP). The DOE operates the WIPP in a manner that physical protections for attractiveness level D or higher special nuclear material (SNM) are not the normal operating condition. Therefore, there is currently a requirement to terminate safeguards before disposal of these wastes at the WIPP. Presented are the processes used to terminate safeguards, lessons learned during the termination process, and how these approaches might be useful for future defense TRU waste needing safeguards termination prior to shipment and disposal at the WIPP. Also described is a new criticality control container, which will increase the amount of fissile material that can be loaded per container, and how it will save significant taxpayer dollars. Retrieval, compliant packaging and shipment of retrievably stored legacy TRU waste has dominated disposal operations at WIPP since it began operations 12 years ago. But because most of this legacy waste has successfully been emplaced in WIPP, the TRU waste clean-up focus is turning to newly-generated TRU materials. A major component will be transuranic SNM, currently managed in safeguards-protected vaults around the weapons complex. As DOE and NNSA continue to consolidate and shrink the weapons complex footprint, it is expected that significant quantities of transuranic SNM will be declared surplus to the nation's needs. Safeguards termination of SNM varies due to the wide range of attractiveness level of the potential material that may be directly discarded as waste. To enhance the efficiency of shipping waste with high TRU fissile content to WIPP, DOE designed an over-pack container, similar to the pipe component, called the criticality control over-pack, which will significantly enhance the efficiency of disposal. Hundreds of shipments of transuranic SNM, suitably packaged to meet WIPP waste acceptance criteria and with safeguards terminated have been successfully emplaced at WIPP (primarily from the Rocky Flats site clean-up) since WIPP opened. DOE expects that thousands more may eventually result from SNM consolidation efforts throughout the weapons complex. (authors)

  12. Enhancer Identification through Comparative Genomics

    SciTech Connect (OSTI)

    Visel, Axel; Bristow, James; Pennacchio, Len A.

    2006-10-01

    With the availability of genomic sequence from numerousvertebrates, a paradigm shift has occurred in the identification ofdistant-acting gene regulatory elements. In contrast to traditionalgene-centric studies in which investigators randomly scanned genomicfragments that flank genes of interest in functional assays, the modernapproach begins electronically with publicly available comparativesequence datasets that provide investigators with prioritized lists ofputative functional sequences based on their evolutionary conservation.However, although a large number of tools and resources are nowavailable, application of comparative genomic approaches remains far fromtrivial. In particular, it requires users to dynamically consider thespecies and methods for comparison depending on the specific biologicalquestion under investigation. While there is currently no single generalrule to this end, it is clear that when applied appropriately,comparative genomic approaches exponentially increase our power ingenerating biological hypotheses for subsequent experimentaltesting.

  13. Required Forms of Identification for Hanford Site Access UNEXPIRED...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    TWO FORMS OF IDENTIFICATION ARE REQUIRED if your identification is a standard driver's license or state-issued ID card from Washington, Illinois, Missouri, Minnesota, or American ...

  14. The paradox of federal energy and defense installations in the West

    SciTech Connect (OSTI)

    Pava, Daniel S

    2008-01-01

    Most planners working west of the 100th meridian are aware that federal lands make up a large portion of the lands in the western states. In fact, federal lands comprise nearly 49% of the area of the fourteen states that make up the WPR family. These lands are usually under the Department of Agriculture (USFS) and the Department of Interior (BLM and NPS), but the Departments of Defense (DOD) and Energy (DOE) are also federal stewards of western lands. These federal military and energy installations play an important role in local and regional western communities and economies. They also play an important role in regional ecologies. It is a paradox that some of these sites have their share of legacy contamination from earlier missions, but they also include some of the most pristine remaining western ecosystems. In some cases, the sites are located near or surrounded by encroaching urbanization, making them particularly valuable lands both for recreation and habitat preservation.

  15. Development of polyphase ceramics for the immobilization of high-level Defense nuclear waste

    SciTech Connect (OSTI)

    Morgan, P.E.D.; Harker, A.B.; Clarke, D.R.; Flintoff, J.J.; Shaw, T.M.

    1983-02-25

    The report contains two major sections: Section I - An Improved Polyphase Ceramic for High-Level Defense Nucleation Waste reports the work conducted on titanium-silica based ceramics for immobilizing Savannah River Plant waste. Section II - Formulation and Processing of Alumina Based Ceramic Nuclear Waste Forms describes the work conducted on developing a generic alumina and alumina-silica based ceramic waste form capable of immobilizing any nuclear waste with a high aluminum content. Such wastes include the Savannah River Plant wastes, Hanford neutralized purex wastes, and Hanford N-Reactor acid wastes. The design approach and process technology in the two reports demonstrate how the generic high waste loaded ceramic form can be applied to a broad range of nuclear waste compositions. The individual sections are abstracted and indexed separately.

  16. MEASUREMENT AND PREDICTION OF RADIOLYTIC HYDROGEN PRODUCTION IN DEFENSE WASTE PROCESSING SLURRIES AT SAVANNAH RIVER SITE

    SciTech Connect (OSTI)

    Bibler, N; John Pareizs, J; Terri Fellinger, T; Cj Bannochie, C

    2007-01-10

    This paper presents results of measurements and predictions of radiolytic hydrogen production rates from two actual process slurries in the Defense Waste Processing Facility (DWPF) at Savannah River Site (SRS). Hydrogen is a flammable gas and its production in nuclear facilities can be a safety hazard if not mitigated. Measurements were made in the Shielded Cells of Savannah River National Laboratory (SRNL) using a sample of Sludge Batch 3 (SB3) currently being processed by the DWPF. Predictions were made using published values for rates of radiolytic reactions producing H{sub 2} in aqueous solutions and the measured radionuclide and chemical compositions of the two slurries. The agreement between measured and predicted results for nine experiments ranged from complete agreement to 24% difference. This agreement indicates that if the composition of the slurry being processed is known, the rate of radiolytic hydrogen production can be reasonably estimated.

  17. Criteria for choosing among competing alternatives for ATBM defenses. Final report

    SciTech Connect (OSTI)

    1995-05-01

    The Center for Strategic and International Studies (CSIS) established an executive review panel to assess the paper written by Peter Zimmerman. The panel consisted of experts on theater missile defenses, U.S. relations with former Soviet Union/Russia, the ABM compliance issues. The panel was NOT able to reach a consensus on the issues raised by the paper. NOR was it able to validate the criteria developed therein. A majority of the panel took exception to many to the facts, findings, and conclusions of the paper. The major points under dispute are: the characterization of the threat, the definition of technical risk, system performance requirements, limits on ATBM systems imposed by the ABM Treaty, Congressional views, cost and IOC dates. The issues are discussed in detail in this review.

  18. Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama

    SciTech Connect (OSTI)

    Newhouse, Robert N.

    2010-01-01

    Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

  19. Multi-level RF identification system

    DOE Patents [OSTI]

    Steele, Kerry D.; Anderson, Gordon A.; Gilbert, Ronald W.

    2004-07-20

    A radio frequency identification system having a radio frequency transceiver for generating a continuous wave RF interrogation signal that impinges upon an RF identification tag. An oscillation circuit in the RF identification tag modulates the interrogation signal with a subcarrier of a predetermined frequency and modulates the frequency-modulated signal back to the transmitting interrogator. The interrogator recovers and analyzes the subcarrier signal and determines its frequency. The interrogator generates an output indicative of the frequency of the subcarrier frequency, thereby identifying the responding RFID tag as one of a "class" of RFID tags configured to respond with a subcarrier signal of a predetermined frequency.

  20. Next-generation Algorithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience

    SciTech Connect (OSTI)

    Burchett, Deon L.; Chen, Richard Li-Yang; Phillips, Cynthia A.; Richard, Jean-Philippe

    2015-05-01

    This report summarizes the work performed under the project project Next-Generation Algo- rithms for Assessing Infrastructure Vulnerability and Optimizing System Resilience. The goal of the project was to improve mathematical programming-based optimization technology for in- frastructure protection. In general, the owner of a network wishes to design a network a network that can perform well when certain transportation channels are inhibited (e.g. destroyed) by an adversary. These are typically bi-level problems where the owner designs a system, an adversary optimally attacks it, and then the owner can recover by optimally using the remaining network. This project funded three years of Deon Burchett's graduate research. Deon's graduate advisor, Professor Jean-Philippe Richard, and his Sandia advisors, Richard Chen and Cynthia Phillips, supported Deon on other funds or volunteer time. This report is, therefore. essentially a replication of the Ph.D. dissertation it funded [12] in a format required for project documentation. The thesis had some general polyhedral research. This is the study of the structure of the feasi- ble region of mathematical programs, such as integer programs. For example, an integer program optimizes a linear objective function subject to linear constraints, and (nonlinear) integrality con- straints on the variables. The feasible region without the integrality constraints is a convex polygon. Careful study of additional valid constraints can significantly improve computational performance. Here is the abstract from the dissertation: We perform a polyhedral study of a multi-commodity generalization of variable upper bound flow models. In particular, we establish some relations between facets of single- and multi- commodity models. We then introduce a new family of inequalities, which generalizes traditional flow cover inequalities to the multi-commodity context. We present encouraging numerical results. We also consider the directed edge-failure resilient network design problem (DRNDP). This problem entails the design of a directed multi-commodity flow network that is capable of fulfilling a specified percentage of demands in the event that any G arcs are destroyed, where G is a constant parameter. We present a formulation of DRNDP and solve it in a branch-column-cut framework. We present computational results.