National Library of Energy BETA

Sample records for floor suite secure

  1. Moving target indicating radar applications in an integrated site security suite

    SciTech Connect (OSTI)

    Appenzeller, R.C. )

    1991-01-01

    The integration of a small, lightweight, low power consumption radar into a site security sensor suite can provide several key advantages in the ability to detect vehicles and personnel over large ground areas. This paper presents rationale for the inclusion of a man-portable Moving Target Indicator (MTI) radar in several security scenarios and outlines the technical specifics of a candidate radar. The Department of Energy (DOE) is currently investigating the effectiveness of a combination of optical sensors in concert with a scanning narrow beam radar at the Nevada Test Site in Mercury, Nevada. Demonstration results from these previous test activities are included herein. Of particular interest is the complimentary nature of this sensor suite where the large field of view achievable with radar allows the optical sensors to be used as pinpoint target classification devices. The inclusion of a radar minimizes operator fatigue caused by watching cameras scanning in azimuth and elevation. Advances in the areas of nuisance alarm rejection and improved range detection against single personnel targets were made in 1990 and this capability is included in the current production version.

  2. PDock Suite

    Energy Science and Technology Software Center (OSTI)

    2007-03-01

    The PDock suite is a software package for performing molecular docking simulations. PDock was designed to bea modular and extensible software package that interfaces easily with third party codes to quickly evaluate and test different methods for moleuclar docking simulations. Docking calculations start with three dimensional atomistic models of two molecules (usually a protein and small molecule) and predict how they will bind to each other. This problem can be broken down into 2 mainmore » steps: 1) predicting various orientation/conformation combinations (called 'poses') of one molecule to "dock" into the other one and 2) scoring each possible pose. The best scoring pose is predicted to be the biological one. PDock has two main algoritms for performing the first step of docking. The first performs a biased search of poses using its own implementation of the published DOCK algorithm. The second is an evolutionary search algorithm. PDock uses a force-field based scoring scheme with an option of perform a more computationally expensive solvation correction. The PDock suite includes the following programs : PDock (main program); PGrid: for pre-processing input files; ProteinPDock (simplified main ()and input file for special case of protein-protein docking); and CombiPDock (simpliefied main() and input file for special case of combinatorial libraries).« less

  3. Roof Savings Calculator Suite

    Energy Science and Technology Software Center (OSTI)

    2013-11-22

    The software options currently supported by the simulation engine can be seen/experienced at www.roofcalc.com. It defaults all values to national averages with options to test a base-case (residential or commercial) building versus a comparison building with inputs for building type, location, building vintage, conditioned area, number of floors, and window-to-wall ratio, cooling system efficiency, type of heating, heating system efficiency, duct location, roof/ceiling insulation level, above-sheathing ventilation, radiant barrier, roof thermal mass, roof solar reflectance,more » roof thermal emittance, utility costs, roof pitch. The Roof Savings Caculator Suite adds utilities and website/web service and the integration of AtticSim with DOE-2.1E, with the end-result being Roof Savings Calculator.« less

  4. Roof Savings Calculator Suite

    SciTech Connect (OSTI)

    New, Joshua R; Garrett, Aaron; Erdem, Ender; Huang, Yu

    2013-11-22

    The software options currently supported by the simulation engine can be seen/experienced at www.roofcalc.com. It defaults all values to national averages with options to test a base-case (residential or commercial) building versus a comparison building with inputs for building type, location, building vintage, conditioned area, number of floors, and window-to-wall ratio, cooling system efficiency, type of heating, heating system efficiency, duct location, roof/ceiling insulation level, above-sheathing ventilation, radiant barrier, roof thermal mass, roof solar reflectance, roof thermal emittance, utility costs, roof pitch. The Roof Savings Caculator Suite adds utilities and website/web service and the integration of AtticSim with DOE-2.1E, with the end-result being Roof Savings Calculator.

  5. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  6. Low floor mass transit vehicle

    DOE Patents [OSTI]

    Emmons, J. Bruce; Blessing, Leonard J.

    2004-02-03

    A mass transit vehicle includes a frame structure that provides an efficient and economical approach to providing a low floor bus. The inventive frame includes a stiff roof panel and a stiff floor panel. A plurality of generally vertical pillars extend between the roof and floor panels. A unique bracket arrangement is disclosed for connecting the pillars to the panels. Side panels are secured to the pillars and carry the shear stresses on the frame. A unique seating assembly that can be advantageously incorporated into the vehicle taking advantage of the load distributing features of the inventive frame is also disclosed.

  7. CNP_TEST_SUITE

    Energy Science and Technology Software Center (OSTI)

    002854MLTPL00 Automated Nuclear Data Test Suite file:///usr/gapps/CNP_src/us/RR/test_suite_cz/cnp_test_suite

  8. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  9. STAYS PNNL SUITE

    Energy Science and Technology Software Center (OSTI)

    002851IBMPC00 STAYSL PNNL Suite http://radiochemscieng.pnnl.gov/research_areas/research_area_description.asp?id=283

  10. Roof Savings Calculator Suite () | SciTech Connect

    Office of Scientific and Technical Information (OSTI)

    Software: Roof Savings Calculator Suite Citation Details Software Request Title: Roof Savings Calculator Suite The software options currently supported by the simulation engine can be seen/experienced at www.roofcalc.com. It defaults all values to national averages with options to test a base-case (residential or commercial) building versus a comparison building with inputs for building type, location, building vintage, conditioned area, number of floors, and window-to-wall ratio, cooling system

  11. Oracle Management Tool Suite

    Energy Science and Technology Software Center (OSTI)

    2007-06-01

    The Oracle Management Tool Suite is used to automatically manage Oracle based systems. This includes startup and shutdown of databases and application servers as well as backup, space management, workload management and log file management.

  12. From Shop Floor to Top Floor: Best Business Practices in Energy...

    Open Energy Information (Open El) [EERE & EIA]

    Shop Floor to Top Floor: Best Business Practices in Energy Efficiency Jump to: navigation, search Tool Summary LAUNCH TOOL Name: From Shop Floor to Top Floor: Best Business...

  13. STAYSL PNNL Suite

    Energy Science and Technology Software Center (OSTI)

    2013-04-12

    The STAYSL PNNL Suite of software provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist of themore » reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations. The software suite consists of the STAYSL PNNL, SHIELD, BCF, and NJpp Fortran codes and the SigPhi Calculator spreadsheet tool. In addition, the development of this software suite and associated data libraries used the third-party NJOY99 Fortran code (http://t2.lanl.gov/nis/codes/njoy99/). The NJOY99 and NJpp codes are used to assemble cross section and covariance input data libraries (for both SHIELD and STAYSL PNNL) from the International Reactor Dosimetry File of 2002 (IRDF-2002; http://www-nds.iaea.org/irdf2002/) developed by the Nuclear Data Section of the International Atomic Energy Agency (Vienna, Austria). The BCF, SigPhi Calculator, and SHIELD software tools are used to calculate corrected activation rates and neutron self-shielding correction factors, which are inputs to the STAYSL PNNL code.« less

  14. Clementine sensor suite

    SciTech Connect (OSTI)

    Ledebuhr, A.G.

    1994-11-15

    LLNL designed and built the suite of six miniaturized light-weight space-qualified sensors utilized in the Clementine mission. A major goal of the Clementine program was to demonstrate technologies originally developed for Ballistic Missile Defense Organization Programs. These sensors were modified to gather data from the moon. This overview presents each of these sensors and some preliminary on-orbit performance estimates. The basic subsystems of these sensors include optical baffles to reject off-axis stray light, light-weight ruggedized optical systems, filter wheel assemblies, radiation tolerant focal plane arrays, radiation hardened control and readout electronics and low mass and power mechanical cryogenic coolers for the infrared sensors. Descriptions of each sensor type are given along with design specifications, photographs and on-orbit data collected.

  15. Geologic Sequestration Software Suite

    Energy Science and Technology Software Center (OSTI)

    2013-11-04

    GS3 is the bundling of the Geological Sequestration Software Suite domain tools with the Velo wiki user interface, rich client interface, and data store. Velo is an application domain independent collaborative user environment for modeling and simulation. Velo has a web browser based wiki interface integrated with a sophisticated content management system supporting data and knowledge management required for large-scale scientific modeling projects. GS3 adds tools and capability specifically in the area of modeling subsurfacemore » reservoirs for the purpose of carbon sequestration. Velo is a core software framework to create scientific domain user environments. Velo is not tied to a specific domain although it provides novel capability needed by many application areas. A well-defined Velo integration layer allows custom applications such as GS3 to leverage the core Velo components to reduce development cost/time and ultimately provide a more capable software product. Compared with previous efforts like ECCE and SALSSA, Velo is a major advancement being a web browser based interface, having a more comprehensive data management architecture, and having intrinsic support for collaboration through the wiki. GS3 adds specific domain tools for looking at site data, developing conceptual and numerical models, building simulation input files, launching and monitoring the progress of those simulations and being able to look at and interpret simulation output.« less

  16. Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    RTU Suite of Projects RTU Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System Michael Brambley, Ph.D. Pacific Northwest National Laboratory Michael.Brambley@pnnl.gov (509) 375-6875 April 4, 2013 2 | Building Technologies Office eere.energy.gov * Packaged air conditioners and heat pumps (RTUs) are used in about 58% of all cooled commercial buildings, serving about 69% of the cooled commercial building floor space (EIA 2003) - Navigant estimates that packaged

  17. SPOT Suite Transforms Beamline Science

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    SPOT Suite Transforms Beamline Science SPOT Suite Transforms Beamline Science SPOT Suite brings advanced algorithms, high performance computing and data management to the masses August 18, 2014 Contact: Linda Vu, +1 510 495 2402, lvu@lbl.gov als.jpg Advanced Light Source (ALS) at Berkeley Lab (Photo by Roy Kaltschmidt) Some mysteries of science can only be explained on a nanometer scale -even smaller than a single strand of human DNA, which is about 2.5 nanometers wide. At this scale, scientists

  18. SPOT Suite Transforms Beamline Science

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    ... One of the first things the SPOT Suite collaboration did was set up data transfer nodes ... at this beamline from anywhere in the world, provided they have Internet access. ...

  19. DC Pro Software Tool Suite

    SciTech Connect (OSTI)

    2009-04-01

    This fact sheet describes how DOE's Data Center Energy Profiler (DC Pro) Software Tool Suite and other resources can help U.S. companies identify ways to improve the efficiency of their data centers.

  20. Real-Time Benchmark Suite

    Energy Science and Technology Software Center (OSTI)

    1992-01-17

    This software provides a portable benchmark suite for real time kernels. It tests the performance of many of the system calls, as well as the interrupt response time and task response time to interrupts. These numbers provide a baseline for comparing various real-time kernels and hardware platforms.

  1. Livermore Compiler Analysis Loop Suite

    Energy Science and Technology Software Center (OSTI)

    2013-03-01

    LCALS is designed to evaluate compiler optimizations and performance of a variety of loop kernels and loop traversal software constructs. Some of the loop kernels are pulled directly from "Livermore Loops Coded in C", developed at LLNL (see item 11 below for details of earlier code versions). The older suites were used to evaluate floating-point performances of hardware platforms prior to porting larger application codes. The LCALS suite is geared toward assissing C++ compiler optimizationsmore » and platform performance related to SIMD vectorization, OpenMP threading, and advanced C++ language features. LCALS contains 20 of 24 loop kernels from the older Livermore Loop suites, plus various others representative of loops found in current production appkication codes at LLNL. The latter loops emphasize more diverse loop constructs and data access patterns than the others, such as multi-dimensional difference stencils. The loops are included in a configurable framework, which allows control of compilation, loop sampling for execution timing, which loops are run and their lengths. It generates timing statistics for analysis and comparing variants of individual loops. Also, it is easy to add loops to the suite as desired.« less

  2. Data-Intensive Benchmarking Suite

    Energy Science and Technology Software Center (OSTI)

    2008-11-26

    The Data-Intensive Benchmark Suite is a set of programs written for the study of data-or storage-intensive science and engineering problems, The benchmark sets cover: general graph searching (basic and Hadoop Map/Reduce breadth-first search), genome sequence searching, HTTP request classification (basic and Hadoop Map/Reduce), low-level data communication, and storage device micro-beachmarking

  3. Mojo Application Monitoring Tool Suite

    Energy Science and Technology Software Center (OSTI)

    2009-12-11

    Mojo is a software tool suite that can be used to monitor the progress of compute jobs on Linux Clusters and other high-performance computing platforms.Mojo is designed to allow system administrators to monitor the health and progress of computing jobs, and to allow users to view the progress and status of their own jobs. The facilities provided include the ability to notify users of job “hangs”, and to take an automated action (e.g killing themore » job) when something goes wrong. These operations can lead to a more efficient use of scarce resources.« less

  4. mac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    mac Military Academy Cadet/Midshipman Program This program places military academy cadets/midshipmen in tours of duty within science, technology, engineering, national security, and relevant fields at any of the NNSA sites. Participants will expand their understanding of the NNSA National Security Enterprise and Department of Defense programs... Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance

  5. Contract carriage battles fought in antitrust suits

    SciTech Connect (OSTI)

    Hume, M.

    1984-11-12

    Antitrust may be the approach natural gas end users need to gain access to gas transmission when pipelines or utilities allegedly resist carriage. Two pending suits could help ease the way for those who have trouble negotiating contract carriage of their self-help gas, and could help set precedents in similar antitrust suits. The cases involve a Colorade brick company's suit against Colorado Interstate Gas Co. and the State of Illinois' suit against Panhandle Eaton Pipeline Co. The issue is whether pipeline companies violate antitrust laws by refusing to carry fuel in competition with their own sales.

  6. CXD 4600, 9103 Second Floor Refurbishment

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    9103 Second Floor Refurbishment (4600) Y-12 Site Oak Ridge, Anderson County, Tennessee The proposed action include: (1) development of the project baseline, design, and and...

  7. From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency

    Energy.gov [DOE]

    This document is the presentation delivered on the Pew Center on Global Climate Change's report From Shop Floor to Top Floor: Best Business Practices in Energy Efficiency, which describes leading corporate energy efficiency programs.

  8. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security

  9. Security Policy

    Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  10. Property:Building/FloorAreaResidential | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    BuildingFloorAreaResidential Jump to: navigation, search This is a property of type Number. Floor area for Residential Pages using the property "BuildingFloorAreaResidential"...

  11. Property:Building/FloorAreaHotels | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    BuildingFloorAreaHotels Jump to: navigation, search This is a property of type Number. Floor area for Hotels Pages using the property "BuildingFloorAreaHotels" Showing 1 page...

  12. Floor Support | Stanford Synchrotron Radiation Lightsource

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Floor Support Service Responsible Person BLDG Extension (650) 926-XXXX Beam Status Duty Operator 120 926-2326 (BEAM) Duty Operator Cell Duty Operator 120 926-4040 User ProgramBeam...

  13. people | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    people NNSA team members balance national security work with parenting For Working Parents Day, meet some of the superhero men & women who balance working to support national security with being parents. Julie Anderson, Operations Research Analyst in NNSA's Defense Programs I think being a working parent, in any organization, is very challenging. ... Denise Peoples honored for 30 years of service Working at NNSA A wide variety of career paths can help you find the type of job that suits your

  14. Security, LLC

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy's corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that

  15. Introduction to the HPC Challenge Benchmark Suite

    SciTech Connect (OSTI)

    Luszczek, Piotr; Dongarra, Jack J.; Koester, David; Rabenseifner,Rolf; Lucas, Bob; Kepner, Jeremy; McCalpin, John; Bailey, David; Takahashi, Daisuke

    2005-04-25

    The HPC Challenge benchmark suite has been released by the DARPA HPCS program to help define the performance boundaries of future Petascale computing systems. HPC Challenge is a suite of tests that examine the performance of HPC architectures using kernels with memory access patterns more challenging than those of the High Performance Linpack (HPL) benchmark used in the Top500 list. Thus, the suite is designed to augment the Top500 list, providing benchmarks that bound the performance of many real applications as a function of memory access characteristics e.g., spatial and temporal locality, and providing a framework for including additional tests. In particular, the suite is composed of several well known computational kernels (STREAM, HPL, matrix multiply--DGEMM, parallel matrix transpose--PTRANS, FFT, RandomAccess, and bandwidth/latency tests--b{sub eff}) that attempt to span high and low spatial and temporal locality space. By design, the HPC Challenge tests are scalable with the size of data sets being a function of the largest HPL matrix for the tested system.

  16. Security Officer

    Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  17. Alcoa: C-Suite Participation in Energy Efficiency Increases Accountabi...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Alcoa: C-Suite Participation in Energy Efficiency Increases Accountability and Staff Engagement Throughout the Organization Alcoa: C-Suite Participation in Energy Efficiency ...

  18. The coyote universe III: simulation suite and precision emulator...

    Office of Scientific and Technical Information (OSTI)

    simulation suite and precision emulator for the nonlinear matter power spectrum Citation Details In-Document Search Title: The coyote universe III: simulation suite and ...

  19. National Security and Cyber Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  20. academic programs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    programs Military Academy Cadet/Midshipman Program This program places military academy cadets/midshipmen in tours of duty within science, technology, engineering, national security, and relevant fields at any of the NNSA sites. Participants will expand their understanding of the NNSA National Security Enterprise and Department of Defense programs... Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  2. Safety, Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  3. Security Perimeter

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  4. The LLNL MPI_Tool Suite

    Energy Science and Technology Software Center (OSTI)

    2013-10-25

    MPI_T is an interface for tools introduced in the 3.0 version of MPI. The interface provides mechanisms for tools to access and set performance and control variables that are exposed by an MPI implementation. We have developed an MPI_T tool suite to provide a first set of tools exploiting the new interface and to get tool writers started on the path to more sophisticated support.

  5. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  6. Safe, Secure and Sustainable Nuclear Energy | Argonne National Laboratory

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Safe, Secure and Sustainable Nuclear Energy Nuclear engineer Mitch Farmer holds a piece of corium from a nuclear reactor severe accident experiment, in which molten core debris, or corium, erodes the concrete floor of a containment building. Farmer is seen next to an eroded test section. Nuclear engineer Mitch Farmer holds a piece of corium from a nuclear reactor severe accident experiment, in which molten core debris, or corium, erodes the concrete floor of a containment building. Farmer is

  7. Property:Building/FloorAreaUnheatedRentedPremises | Open Energy...

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaUnheatedRentedPremises Jump to: navigation, search This is a property of type Number. Floor area for Unheated but...

  8. Property:Building/FloorAreaHeatedGarages | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaHeatedGarages Jump to: navigation, search This is a property of type Number. Floor area for Heated garages (> 10 C)...

  9. Property:Building/FloorAreaOffices | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaOffices Jump to: navigation, search This is a property of type Number. Floor area for Offices Pages using the property...

  10. Property:Building/FloorAreaRestaurants | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaRestaurants Jump to: navigation, search This is a property of type Number. Floor area for Restaurants Pages using the...

  11. Property:Building/FloorAreaShops | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaShops Jump to: navigation, search This is a property of type Number. Floor area for Shops Pages using the property...

  12. Property:Building/FloorAreaWarehouses | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaWarehouses Jump to: navigation, search This is a property of type Number. Floor area for Warehouses Pages using the...

  13. Property:Building/FloorAreaOtherRetail | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaOtherRetail Jump to: navigation, search This is a property of type Number. Floor area for Other retail Pages using the...

  14. Property:Building/FloorAreaTheatresConcertHallsCinemas | Open...

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaTheatresConcertHallsCinemas Jump to: navigation, search This is a property of type Number. Floor area for Theatres,...

  15. Property:Building/FloorAreaHealthServicesDaytime | Open Energy...

    Open Energy Information (Open El) [EERE & EIA]

    Jump to: navigation, search This is a property of type Number. Floor area for Daytime health services Pages using the property "BuildingFloorAreaHealthServicesDaytime" Showing 4...

  16. Property:Building/FloorAreaSportCenters | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    This is a property of type Number. Floor area for Swimming baths, indoor and outdoor sports centres Pages using the property "BuildingFloorAreaSportCenters" Showing 2 pages...

  17. Water Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  18. Breaking the silos: The art documentation suite

    SciTech Connect (OSTI)

    Kutschke, Robert K.

    2015-12-23

    The art event-processing framework is used by almost all new experiments at Fermilab, and by several outside of Fermilab. All use art as an external product in the same sense that the compiler, ROOT, Geant4, CLHEP and boost are external products. The art team has embarked on a campaign to document art and develop training materials for new users. Many new users of art have little or no knowledge of C++, software engineering, build systems or the many external packages used by art or their experiments, such as ROOT, CLHEP, HEPPDT, and boost. To effectively teach art requires that the training materials include appropriate introductions to these topics as they are encountered. Experience has shown that simply referring readers to the existing native documentation does not work, too often a simple idea that they need to understand is described in a context that presumes prerequisites that are unimportant for a beginning user of art. There is the additional complication that the training materials must be presented in a way that does not presume knowledge of any of the experiments using art. Finally, new users of art arrive at random times throughout the year and the training materials must allow them to start to learn art at any time. This presentation will explain the strategies adopted by the art team to develop a documentation suite that complies with these boundary conditions. It will also show the present status of the documentation suite, including feedback the art team has received from pilot users.

  19. Ocean floor mounting of wave energy converters

    DOE Patents [OSTI]

    Siegel, Stefan G

    2015-01-20

    A system for mounting a set of wave energy converters in the ocean includes a pole attached to a floor of an ocean and a slider mounted on the pole in a manner that permits the slider to move vertically along the pole and rotate about the pole. The wave energy converters can then be mounted on the slider to allow adjustment of the depth and orientation of the wave energy converters.

  20. Specification for the VERA Depletion Benchmark Suite

    SciTech Connect (OSTI)

    Kim, Kang Seog

    2015-12-17

    CASL-X-2015-1014-000 iii Consortium for Advanced Simulation of LWRs EXECUTIVE SUMMARY The CASL neutronics simulator MPACT is under development for the neutronics and T-H coupled simulation for the pressurized water reactor. MPACT includes the ORIGEN-API and internal depletion module to perform depletion calculations based upon neutron-material reaction and radioactive decay. It is a challenge to validate the depletion capability because of the insufficient measured data. One of the detoured methods to validate it is to perform a code-to-code comparison for benchmark problems. In this study a depletion benchmark suite has been developed and a detailed guideline has been provided to obtain meaningful computational outcomes which can be used in the validation of the MPACT depletion capability.

  1. STAYSL PNNL Suite of Software Tools.

    Energy Science and Technology Software Center (OSTI)

    2013-07-19

    Version: 00 The STAYSL PNNL software suite provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist ofmore » the reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations.« less

  2. Breaking the silos: The art documentation suite

    DOE PAGES-Beta [OSTI]

    Kutschke, Robert K.

    2015-12-23

    The art event-processing framework is used by almost all new experiments at Fermilab, and by several outside of Fermilab. All use art as an external product in the same sense that the compiler, ROOT, Geant4, CLHEP and boost are external products. The art team has embarked on a campaign to document art and develop training materials for new users. Many new users of art have little or no knowledge of C++, software engineering, build systems or the many external packages used by art or their experiments, such as ROOT, CLHEP, HEPPDT, and boost. To effectively teach art requires that themore » training materials include appropriate introductions to these topics as they are encountered. Experience has shown that simply referring readers to the existing native documentation does not work, too often a simple idea that they need to understand is described in a context that presumes prerequisites that are unimportant for a beginning user of art. There is the additional complication that the training materials must be presented in a way that does not presume knowledge of any of the experiments using art. Finally, new users of art arrive at random times throughout the year and the training materials must allow them to start to learn art at any time. This presentation will explain the strategies adopted by the art team to develop a documentation suite that complies with these boundary conditions. It will also show the present status of the documentation suite, including feedback the art team has received from pilot users.« less

  3. CORE (Common Operating Response Environment) Software Technology Suite

    SciTech Connect (OSTI)

    Gelston, Gariann; Rohlfing, Kerrie

    2015-05-26

    Agencies that oversee complex, multi-stakeholder programs need efficient, secure ways to link people and knowledge within and across organizations. The Common Operating Response Environment (CORE), a software suite developed by PNNL researchers does just that. The CORE tool—which is customizable for a multitude of uses—facilitates situational awareness by integrating diverse data streams without the need to reformat them, summarizing that information, and providing users with the information they need to rapidly understand and appropriately respond to situations. It is mobile device-ready, has a straightforward interface for ease of use across organizations and skill sets, and is incredibly configurable to the needs of each specific user, whether they require data summaries for high-level decision makers or tactical maps, operational data, or weather information for responders in the field. Information can be input into CORE and queried in a variety of ways—using customized forms, reports, visuals, or other organizational templates—according to the needs of each user’s organization, teams, and business processes. CORE data forms, for instance, could be accessed and used in real-time to capture information about vessels being inspected for nuclear material.

  4. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  5. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  6. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  7. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Water Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  9. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2016-07-12

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Infrastructure Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  11. Infrastructure Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and ...

  12. Security Specialist

    Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  13. Infrastructure Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  14. Method and apparatus for recovering a gas from a gas hydrate located on the ocean floor

    DOE Patents [OSTI]

    Wyatt, Douglas E.

    2001-01-01

    A method and apparatus for recovering a gas from a gas hydrate on the ocean floor includes a flexible cover, a plurality of steerable base members secured to the cover, and a steerable mining module. A suitable source for inflating the cover over the gas hydrate deposit is provided. The mining module, positioned on the gas hydrate deposit, is preferably connected to the cover by a control cable. A gas retrieval conduit or hose extends upwardly from the cover to be connected to a support ship on the ocean surface.

  15. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  16. Nuclear Security Enterprise | National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  17. Security Conditions

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  18. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Computer Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  20. Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    and RTU Smart Monitoring and Diagnostic System - 2013 BTO Peer Review Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic ...

  1. Suite of Cellulase Enzyme Technologies for Biomass Conversion...

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Biomass and Biofuels Biomass and Biofuels Find More Like This Return to Search Suite of Cellulase Enzyme Technologies for Biomass Conversion National Renewable Energy Laboratory...

  2. The MCNP6 Analytic Criticality Benchmark Suite (Technical Report...

    Office of Scientific and Technical Information (OSTI)

    Citation Details In-Document Search Title: The MCNP6 Analytic Criticality Benchmark Suite Authors: Brown, Forrest B. 1 + Show Author Affiliations Los Alamos National Laboratory ...

  3. Personnel Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  4. Security Specialist

    Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  5. Security Rulemaking

    Office of Environmental Management (EM)

    Program (WP) | Department of Energy Securing Clean, Domestic, Affordable Energy with Wind (Fact Sheet), Wind Program (WP) Securing Clean, Domestic, Affordable Energy with Wind (Fact Sheet), Wind Program (WP) This fact sheet provides a brief description of the Wind Energy Market and describes the U.S. Department of Energy's Wind Program research and development efforts. eere_wind_water.pdf (499.36 KB) More Documents & Publications Offshore Wind Projects Wind Program Accomplishments Wind

  6. Information Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  7. Personnel Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  8. Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  9. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  10. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) About / Our Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory

  11. Information Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  12. Information Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  13. Information Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  14. Defense Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is

  15. Personnel Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  16. Security Conditions

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  17. Exhibit Hall Floor Plan & Hours | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Exhibit Hall Floor Plan & Hours Exhibit Hall Floor Plan & Hours Exhibit Hall Floor Plan & Hours Exhibitor Move-in Hours Tuesday, May 16 9:00 am - 5:00 pm Wednesday, May 17 7:00 am - Noon Exhibit Hall Hours Wednesday, May 17 Opens: Noon - 3:45 pm (Lunch will be served) Closes: 3:45 pm - 5:00 pm) Reopens: 5:00 pm - 7:00 pm (Welcome Reception) Thursday, May 18 Opens: 7:00 am - Noon (Breakfast will be served) Closes: Noon (Lunch will be served) Exhibitor Move-out Hours Thursday, May 18

  18. Savings Project: Insulate and Air Seal Floors Over Unconditioned Garages |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy and Air Seal Floors Over Unconditioned Garages Savings Project: Insulate and Air Seal Floors Over Unconditioned Garages Addthis Project Level Easy Energy Savings Depend on energy cost, R-value increase, and airtightness of newly insulated floor compared to existing. Time to Complete 4-8 hours Overall Cost $0.60 to $1.00 PER SQUARE FOOT FOR R-30 BATTS Careful air sealing and insulation between an unconditioned garage and the conditioned space above can increase comfort,

  19. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  20. Extender for securing a closure

    SciTech Connect (OSTI)

    Thomas, II, Patrick A.

    2012-10-02

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  1. Energy Security Council

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  2. ENERGY SUPPLY SECURITY 2014

    Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  3. Full-scale shear tests of embedded floor modules

    SciTech Connect (OSTI)

    Fricke, K.E.; Jones, W.D.; Burdette, E.G.

    1984-01-01

    A floor module used to support a centrifuge machine is a steel framework embedded in a 2-ft (610-mm) thick concrete slab. This steel framework is made up of four cylindrical hollow sockets tied together with four S-beams to form a square pattern. In the event of a centrifuge machine wreck, large forces are transmitted from the machine to the corner sockets (through connecting steel lugs) and to the concrete slab. The floor modules are loaded with a combination of torsion and shear forces in the plane of the floor slab. Precisely how these wreck loads are transmitted to, and reacted by, the floor modules and the surrounding concrete was the scope of a series of full-scale tests performed at the DOE Gas Centrifuge Enrichment Plant (GCEP) located near Piketon, Ohio. This report describes the tests and the results of the data reduction to date.

  4. Property:Building/FloorAreaMiscellaneous | Open Energy Information

    Open Energy Information (Open El) [EERE & EIA]

    the property "BuildingFloorAreaMiscellaneous" Showing 25 pages using this property. S Sweden Building 05K0002 + 360 + Sweden Building 05K0005 + 110 + Sweden Building 05K0013 +...

  5. Repairing Walls & Floors: How To's for the Handy Homeowner

    SciTech Connect (OSTI)

    2006-01-09

    This brochure provides handy homeowners with tips on how to properly repair walls and floors in their homes that sustained damage during a hurricane. This publications is a part of the How To's for the Handy Homeowner Series.

  6. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  7. Tag: Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Tag: Security Displaying 1 - 7 of 7... Category: Security Integrating Safeguards, Security, & Emergency Services at CNS Lindy Pyatt, Y-12 S&S Performance Assurance Issues Management, assists Gannon Tucker, the CNS SS&ES change control administrator based at Pantex, with consolidating security's document control. More... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these instructions. More...

  8. Information Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  9. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  10. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  11. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  12. Global Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    sector. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  13. EIA-800

    U.S. Energy Information Administration (EIA) (indexed site)

    Email: Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Questions? ...

  14. Personnel Security

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  15. Videos | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Videos Videos Select a movie from the list below by clicking on the image or the title. Access Rate Control System Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry through full-height turnstiles. Rapid Deployment Shelter System Originally designed as a mobile surgical suite, the RDSS can also be converted and used for a command, control, logisitics, or operations center. Rapid Deployment Shelter System, Application The RDSS provides

  16. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  17. Security Notice | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  18. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  19. Floor-supply displacement air-conditioning: Laboratory experiments

    SciTech Connect (OSTI)

    Akimoto, Takashi; Nobe, Tatsuo; Tanabe, Shinichi; Kimura, Kenichi

    1999-07-01

    The results of laboratory measurements on the performance of a floor-supply displacement air-conditioning system in comparison to a displacement ventilation system with a side-wall-mounted diffuser and a ceiling-based distribution system are described. Thermal stratification was observed, as there were greater vertical air temperature differences in both of the displacement systems than in the ceiling-based system. The floor-supply displacement air-conditioning system produced a uniformly low air velocity at each measurement height, while a rather high air velocity near the floor was observed for the displacement ventilation system with a sidewall-mounted diffuser. Local mean age of air of the floor-supply displacement air-conditioning system was lower than that of the other systems, especially in the lower part of the room. According to the simulation results, the floor-supply displacement air-conditioning system with outdoor air cooling requires 34% less energy than the conventional air-conditioning system with outdoor air cooling.

  20. NERSC Computer Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  1. DYNA3D/ParaDyn Regression Test Suite Inventory

    SciTech Connect (OSTI)

    Lin, J I

    2011-01-25

    The following table constitutes an initial assessment of feature coverage across the regression test suite used for DYNA3D and ParaDyn. It documents the regression test suite at the time of production release 10.1 in September 2010. The columns of the table represent groupings of functionalities, e.g., material models. Each problem in the test suite is represented by a row in the table. All features exercised by the problem are denoted by a check mark in the corresponding column. The definition of ''feature'' has not been subdivided to its smallest unit of user input, e.g., algorithmic parameters specific to a particular type of contact surface. This represents a judgment to provide code developers and users a reasonable impression of feature coverage without expanding the width of the table by several multiples. All regression testing is run in parallel, typically with eight processors. Many are strictly regression tests acting as a check that the codes continue to produce adequately repeatable results as development unfolds, compilers change and platforms are replaced. A subset of the tests represents true verification problems that have been checked against analytical or other benchmark solutions. Users are welcomed to submit documented problems for inclusion in the test suite, especially if they are heavily exercising, and dependent upon, features that are currently underrepresented.

  2. The Los Alamos suite of relativistic atomic physics codes

    DOE PAGES-Beta [OSTI]

    Fontes, C. J.; Zhang, H. L.; Jr, J. Abdallah; Clark, R. E. H.; Kilcrease, D. P.; Colgan, J.; Cunningham, R. T.; Hakel, P.; Magee, N. H.; Sherrill, M. E.

    2015-05-28

    The Los Alamos SuitE of Relativistic (LASER) atomic physics codes is a robust, mature platform that has been used to model highly charged ions in a variety of ways. The suite includes capabilities for calculating data related to fundamental atomic structure, as well as the processes of photoexcitation, electron-impact excitation and ionization, photoionization and autoionization within a consistent framework. These data can be of a basic nature, such as cross sections and collision strengths, which are useful in making predictions that can be compared with experiments to test fundamental theories of highly charged ions, such as quantum electrodynamics. The suitemore » can also be used to generate detailed models of energy levels and rate coefficients, and to apply them in the collisional-radiative modeling of plasmas over a wide range of conditions. Such modeling is useful, for example, in the interpretation of spectra generated by a variety of plasmas. In this work, we provide a brief overview of the capabilities within the Los Alamos relativistic suite along with some examples of its application to the modeling of highly charged ions.« less

  3. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  4. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  5. Incidents of Security Concern

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION ... Security; Office of Security Policy, GTNHS-51; 1000 Independence Ave., SW; Washington, DC ...

  6. Tag: security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    security Tag: security Displaying 1 - 10 of 13... Category: Employees & Retirees Tactical Response Force 1 graduation: a family reunion of sorts Family ties makes a fitting theme for Tactical Response Force 1 Class 3-16's graduation ceremony. More... Category: News Y-12 National Security Complex reopened Officials at the Y-12 National Security Complex have reopened the plant to employees following the early morning closure of Y-12 because of a law enforcement situation. More... Category:

  7. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security Meet a Machine: RPMs keep watch 24/7 to strengthen global nuclear security Ensuring that nuclear materials are not being illicitly moved is part of NNSA's core mission to reduce nuclear and radiological threats. However, since traditional security tools - such as metal detectors, X-ray scanners, and sniffer dogs - cannot measure radiation, frontline... U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA

  8. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where high-priority

  9. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    national security campus Kansas City National Security Campus volunteers help students with FIRST Robotics The FIRST Robotics competition in Kansas City, March 10-12, resembled a medieval battlefield as nearly 50 high school teams battled robot against robot to scale the opponent's defenses and capture their tower and flag. For the past 10 years, Kansas City National Security Campus employees have... Kansas City National Security Campus contractor and University of Kansas to collaborate on NNSA

  10. Strategy Guideline: Quality Management in Existing Homes - Cantilever Floor Example

    SciTech Connect (OSTI)

    Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented.

  11. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  12. Advancing Global Nuclear Security

    Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  13. Information Technology Specialist (Security)

    Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  14. Personnel Security Specialist

    Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  19. BROADER National Security Missions

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  20. Personnel Security Activities

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  1. Office of Security Assessments

    Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  2. National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  3. NREL: Energy Storage - Battery Lifetime Analysis and Simulation Tool Suite

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Battery Lifetime Analysis and Simulation Tool Suite Lithium-ion (Li-ion) batteries used in EVs and stationary energy storage applications must be optimized to justify their high upfront costs. Given that batteries degrade with use and storage, strategies for optimization must factor in many years of use with a number of variables, including: Temperature State-of-charge histories Electricity current levels Cycle depth and frequency. These factors can all affect rates of battery degradation,

  4. The RBDMS is a suite of integrated, electron

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    RBDMS is a suite of integrated, electronic data management tools that assist state regulatory agencies in the oversight of oil and natural gas drilling and production operations. It was developed by the Ground Water Protection Council (GWPC)-a national nonprofit organization whose members are state regulatory and resource management agencies dedicated to protecting and conserving ground water-in partnership with the U.S. Department of Energy's (DOE's) Office of Oil and Natural Gas, the National

  5. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. Property:Building/FloorAreaSchoolsChildDayCare | Open Energy...

    Open Energy Information (Open El) [EERE & EIA]

    Property Edit with form History Property:BuildingFloorAreaSchoolsChildDayCare Jump to: navigation, search This is a property of type Number. Floor area for Schools, including...

  7. Personnel Security Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  8. Personnel Security Program Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  9. Office of Security Assistance

    Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  10. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  11. Waste Assessment Baseline for the IPOC Second Floor, West Wing

    SciTech Connect (OSTI)

    McCord, Samuel A

    2015-04-01

    Following a building-wide waste assessment in September, 2014, and subsequent presentation to Sandia leadership regarding the goal of Zero Waste by 2025, the occupants of the IPOC Second Floor, West Wing contacted the Materials Sustainability and Pollution Prevention (MSP2) team to guide them to Zero Waste in advance of the rest of the site. The occupants are from Center 3600, Public Relations and Communications , and Center 800, Independent Audit, Ethics and Business Conduct . To accomplish this, MSP2 conducted a new limited waste assessment from March 2-6, 2015 to compare the second floor, west wing to the building as a whole. The assessment also serves as a baseline with which to mark improvements in diversion in approximately 6 months.

  12. pcircle - A Suite of Scalable Parallel File System Tools

    Energy Science and Technology Software Center (OSTI)

    2015-10-01

    Most of the software related to file system are written for conventional local file system, they are serialized and can't take advantage of the benefit of a large scale parallel file system. "pcircle" software builds on top of ubiquitous MPI in cluster computing environment and "work-stealing" pattern to provide a scalable, high-performance suite of file system tools. In particular - it implemented parallel data copy and parallel data checksumming, with advanced features such as asyncmore » progress report, checkpoint and restart, as well as integrity checking.« less

  13. pcircle - A Suite of Scalable Parallel File System Tools

    SciTech Connect (OSTI)

    WANG, FEIYI

    2015-10-01

    Most of the software related to file system are written for conventional local file system, they are serialized and can't take advantage of the benefit of a large scale parallel file system. "pcircle" software builds on top of ubiquitous MPI in cluster computing environment and "work-stealing" pattern to provide a scalable, high-performance suite of file system tools. In particular - it implemented parallel data copy and parallel data checksumming, with advanced features such as async progress report, checkpoint and restart, as well as integrity checking.

  14. PHASE CHANGE MATERIALS IN FLOOR TILES FOR THERMAL ENERGY STORAGE

    SciTech Connect (OSTI)

    Douglas C. Hittle

    2002-10-01

    Passive solar systems integrated into residential structures significantly reduce heating energy consumption. Taking advantage of latent heat storage has further increased energy savings. This is accomplished by the incorporation of phase change materials into building materials used in passive applications. Trombe walls, ceilings and floors can all be enhanced with phase change materials. Increasing the thermal storage of floor tile by the addition of encapsulated paraffin wax is the proposed topic of research. Latent heat storage of a phase change material (PCM) is obtained during a change in phase. Typical materials use the latent heat released when the material changes from a liquid to a solid. Paraffin wax and salt hydrates are examples of such materials. Other PCMs that have been recently investigated undergo a phase transition from one solid form to another. During this process they will release heat. These are known as solid-state phase change materials. All have large latent heats, which makes them ideal for passive solar applications. Easy incorporation into various building materials is must for these materials. This proposal will address the advantages and disadvantages of using these materials in floor tile. Prototype tile will be made from a mixture of quartz, binder and phase change material. The thermal and structural properties of the prototype tiles will be tested fully. It is expected that with the addition of the phase change material the structural properties will be compromised to some extent. The ratio of phase change material in the tile will have to be varied to determine the best mixture to provide significant thermal storage, while maintaining structural properties that meet the industry standards for floor tile.

  15. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  16. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  17. Nuclear Security Enterprise | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the application of science, technology, engineering, (ST&E) and manufacturing. In the next 20 years, the U.S. nuclear weapons stockpile will be sustained and modernized through vigorous surveillance, assessment, life extension and dismantlement efforts. In addition, progress will be made in modernizing the physical

  18. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Summit Team members receive DOE Secretary Awards for nuclear security efforts This month NNSA team members received honors as part of the Secretary's Awards Program. The program, designed to recognize service and contributions of Department of Energy (DOE) employees to mission in benefit of the Nation, is comprised of several award types. The Secretary's Honor... U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future

  19. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  20. Personnel Security Program | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    several key program areas including Defense, Nuclear Nonproliferation, Naval ... & Classification (OPFCC) is part of the NNSA, Office of Defense Nuclear Security. ...

  1. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. ...

  2. Secure Storage | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  4. International Nuclear Security | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    world-wide to improve the security of proliferation-sensitive materials, particularly ... Related Topics nopnproliferation R&D proliferation detection Related News Radiological ...

  5. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  6. Integration of APECS and VE-Suite for Data Overlay

    SciTech Connect (OSTI)

    McCorkel, Doug; Bivins, Gerrick; Jordan, Terry; Bryden, Mark; Zitney, S.E.; Widmann, John; Osawe, Maxwell

    2008-06-01

    In the design of advanced power generation facilities, process simulation tools are being utilized to model plant behavior and quickly analyze results. While such tools enable investigation of crucial aspects of plant design, typical commercial process simulators still do not explore some plant design information, including high-fidelity data from computational fluid dynamics (CFD) models of complex thermal and fluid flow phenomena, economics data used for policy decisions, operational data after the plant is constructed, and as-built information for use in as-designed models. Software tools must be created that allow disparate sources of information to be integrated for facilitating accurate and effective plant design. At the Department of Energy’s (DOE) National Energy Technology Laboratory (NETL), the Advanced Process Engineering Co-Simulator (APECS) has been developed as an integrated software suite that combines process simulation (e.g., Aspen Plus®) and high-fidelity equipment simulation (e.g., FLUENT®). In this paper, the integration of the high-fidelity CFD data with overall process data in a virtual power simulation environment will be described. More specifically, we will highlight VE-Suite, an open-source virtual engineering (VE) software toolkit, and its support of Aspen Plus® Hierarchy blocks via the VE-AspenUnit.

  7. Integration of APECS and VE-Suite for data overlay

    SciTech Connect (OSTI)

    McCorkel, D.; Bivins, G.; Jordan, T.; Bryden, M.; Zitney, S.; Widmann, J.; Osawe, M.

    2008-01-01

    In the design of advanced power generation facilities, process simulation tools are being utilized to model plant behavior and quickly analyze results. While such tools enable investigation of crucial aspects of plant design, typical commercial process simulators still do not explore some plant design information, including high-fidelity data from computational fluid dynamics (CFD) models of complex thermal and fluid flow phenomena, economics data used for policy decisions, operational data after the plant is constructed, and as-built information for use in as-designed models. Software tools must be created that allow disparate sources of information to be integrated for facilitating accurate and effective plant design. At the Department of Energy’s (DOE) National Energy Technology Laboratory (NETL), the Advanced Process Engineering Co-Simulator (APECS) has been developed as an integrated software suite that combines process simulation (e.g., Aspen Plus®) and high-fidelity equipment simulation (e.g., FLUENT®). In this paper, the integration of the high-fidelity CFD data with overall process data in a virtual power simulation environment will be described. More specifically, we will highlight VE-Suite, an open-source virtual engineering (VE) software toolkit, and its support of Aspen Plus® Hierarchy blocks via the VE-AspenUnit.

  8. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  9. Security - DOE Directives, Delegations, and Requirements

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security by Website Administrator Back

  10. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy Administrator for Defense Nuclear Nonproliferation (DNN), David Huizenga, participated in a ceremony commemorating the transition of a radiation detection system at the Port of Yangshan to the General

  11. Enhanced Verification Test Suite for Physics Simulation Codes

    SciTech Connect (OSTI)

    Kamm, J R; Brock, J S; Brandon, S T; Cotrell, D L; Johnson, B; Knupp, P; Rider, W; Trucano, T; Weirs, V G

    2008-10-10

    This document discusses problems with which to augment, in quantity and in quality, the existing tri-laboratory suite of verification problems used by Los Alamos National Laboratory (LANL), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL). The purpose of verification analysis is demonstrate whether the numerical results of the discretization algorithms in physics and engineering simulation codes provide correct solutions of the corresponding continuum equations. The key points of this document are: (1) Verification deals with mathematical correctness of the numerical algorithms in a code, while validation deals with physical correctness of a simulation in a regime of interest. This document is about verification. (2) The current seven-problem Tri-Laboratory Verification Test Suite, which has been used for approximately five years at the DOE WP laboratories, is limited. (3) Both the methodology for and technology used in verification analysis have evolved and been improved since the original test suite was proposed. (4) The proposed test problems are in three basic areas: (a) Hydrodynamics; (b) Transport processes; and (c) Dynamic strength-of-materials. (5) For several of the proposed problems we provide a 'strong sense verification benchmark', consisting of (i) a clear mathematical statement of the problem with sufficient information to run a computer simulation, (ii) an explanation of how the code result and benchmark solution are to be evaluated, and (iii) a description of the acceptance criterion for simulation code results. (6) It is proposed that the set of verification test problems with which any particular code be evaluated include some of the problems described in this document. Analysis of the proposed verification test problems constitutes part of a necessary--but not sufficient--step that builds confidence in physics and engineering simulation codes. More complicated test cases, including physics models of greater

  12. CoMD Implementation Suite in Emerging Programming Models

    Energy Science and Technology Software Center (OSTI)

    2014-09-23

    CoMD-Em is a software implementation suite of the CoMD [4] proxy app using different emerging programming models. It is intended to analyze the features and capabilities of novel programming models that could help ensure code and performance portability and scalability across heterogeneous platforms while improving programmer productivity. Another goal is to provide the authors and venders with some meaningful feedback regarding the capabilities and limitations of their models. The actual application is a classical molecularmore » dynamics (MD) simulation using either the Lennard-Jones method (LJ) or the embedded atom method (EAM) for primary particle interaction. The code can be extended to support alternate interaction models. The code is expected ro run on a wide class of heterogeneous hardware configurations like shard/distributed/hybrid memory, GPU's and any other platform supported by the underlying programming model.« less

  13. User antitrust suit alleges utility cabal limits buy-back

    SciTech Connect (OSTI)

    Efron, S.

    1984-10-15

    An antitrust suit against 90 Georgia electric utilities, charging that their monopoly of retail electricity sales should not preclude cogenerators and small power producers from selling surplus power to utilities elsewhere on the network, could set a national precedent allowing cogenerators to shop around for the best buy-back rate. Greensboro Lumber Co. charges that the utilities' refusal to wheel cogenerated power to potential purchasers represents a restraint of trade. The lumber company contends that cogenerators should sell to the wholesale market, where utilities have no state-granted monopoly. Attorneys for the two sides are unsure of the immediate outcome, but predict that antitrust action or threatened action could give cogenerators unfair leverage.

  14. User Guide for the STAYSL PNNL Suite of Software Tools

    SciTech Connect (OSTI)

    Greenwood, Lawrence R.; Johnson, Christian D.

    2013-02-27

    The STAYSL PNNL software suite provides a set of tools for working with neutron activation rates measured in a nuclear fission reactor, an accelerator-based neutron source, or any neutron field to determine the neutron flux spectrum through a generalized least-squares approach. This process is referred to as neutron spectral adjustment since the preferred approach is to use measured data to adjust neutron spectra provided by neutron physics calculations. The input data consist of the reaction rates based on measured activities, an initial estimate of the neutron flux spectrum, neutron activation cross sections and their associated uncertainties (covariances), and relevant correction factors. The output consists of the adjusted neutron flux spectrum and associated covariance matrix, which is useful for neutron dosimetry and radiation damage calculations.

  15. Nevada National Security Site

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  16. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  17. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  18. Office of Information Security

    Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  19. Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  20. National Security Science - April 2013

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Megawatts of power, millions of gallons of water, a football-field-size floor Turning Big Data into fast data Solving the roadblock for tomorrow's exascale supercomputing...

  1. National Security Science - April 2013

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    floor Turning Big Data into fast data Solving the roadblock for tomorrow's exascale supercomputing Killing killer asteroids Could nuclear explosives avert a global disaster? ...

  2. Global Security 2009

    Office of Environmental Management (EM)

    ... Management *Data Loss Prevention *Audit ability *OI & CS Technology Platforms *Big Data *Analytics *Monitoring *Cyber Security *Intelligence *Hyper Innovation Global ...

  3. Personnel Security Program Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  4. Security Risk Assessment

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  5. National Security Science Archive

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    NSS Archive National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Archive National Security Science magazine showcases the importance, breadth, and depth of the Laboratory's scientific and technical work that is used to solve key challenges to U.S. national security. NSS April 2016 April 2016 viewer | web | print NSS July 2014 July 2015 viewer | web | print NSS July 2014 December 2014 viewer | web | print NSS July 2014 July 2014 viewer | web

  6. Lab announces security changes

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  7. Modular, security enclosure and method of assembly

    DOE Patents [OSTI]

    Linker, Kevin L.; Moyer, John W.

    1995-01-01

    A transportable, reusable rapidly assembled and disassembled, resizable modular, security enclosure utilizes a stepped panel construction. Each panel has an inner portion and an outer portion which form joints. A plurality of channels can be affixed to selected joints of the panels. Panels can be affixed to a base member and then affixed to one another by the use of elongated pins extending through the channel joints. Alternatively, the base member can be omitted and the panels themselves can be used as the floor of the enclosure. The pins will extend generally parallel to the joint in which they are located. These elongated pins are readily inserted into and removable from the channels in a predetermined sequence to allow assembly and disassembly of the enclosure. A door constructed from panels is used to close the opening to the enclosure.

  8. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  9. Headquarters Facilities Master Security Plan - Chapter 10, Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Awareness Program | Department of Energy 0, Security Awareness Program Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program 2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program This chapter covers all the security awareness briefings conducted at HQ. The following security briefings are required for all HQ Federal employees and contractors: an Initial Security Briefing, which is given when a new employee starts work; the

  10. Microsoft Word - MHI Letterhead - 2111 Wilson Blvd, Suite 100.doc

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    17, 2010 Office of the General Counsel Department of Energy 1000 Independence Avenue, SW Washington, D.C. 20585-0121 Memorandum for the Record Ex Parte Communication Department of Energy Meeting- Wednesday, July 14, 20103:00 - 4:00 p.m. The purpose of the meeting was to provide information to DOE staff on the Advanced Notice of Proposed Rulemaking on Section 414 of the Energy Independence and Security Act (EISA) of 2007 to establish energy standards for manufactured housing. In attendance at the

  11. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  12. Tag: global security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    global security Tag: global security Displaying 1 - 10 of 23... Category: Global Security Additive Manufacturing Y-12's machining expertise complements our ability to produce additive manufacturing tooling and components. More... Category: Global Security Technologies and Research Capabilities We're furthering research and development of additive manufacturing in national security applications. More... Category: Global Security Alarm Response Training Academy celebrates an anniversary Alarm

  13. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  14. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  15. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  16. Sandia Energy - Installation Energy Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  17. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  18. 120 years of U.S. residential housing stock and floor space

    SciTech Connect (OSTI)

    Moura, Maria Cecilia P.; Smith, Steven J.; Belzer, David B.; Zhou, Wei -Xing

    2015-08-11

    Residential buildings are a key driver of energy consumption and also impact transportation and land-use. Energy consumption in the residential sector accounts for one-fifth of total U.S. energy consumption and energy-related CO₂ emissions, with floor space a major driver of building energy demands. In this work a consistent, vintage-disaggregated, annual long-term series of U.S. housing stock and residential floor space for 1891–2010 is presented. An attempt was made to minimize the effects of the incompleteness and inconsistencies present in the national housing survey data. Over the 1891–2010 period, floor space increased almost tenfold, from approximately 24,700 to 235,150 million square feet, corresponding to a doubling of floor space per capita from approximately 400 to 800 square feet. While population increased five times over the period, a 50% decrease in household size contributed towards a tenfold increase in the number of housing units and floor space, while average floor space per unit remains surprisingly constant, as a result of housing retirement dynamics. In the last 30 years, however, these trends appear to be changing, as household size shows signs of leveling off, or even increasing again, while average floor space per unit has been increasing. GDP and total floor space show a remarkably constant growth trend over the period and total residential sector primary energy consumption and floor space show a similar growth trend over the last 60 years, decoupling only within the last decade.

  19. Los Alamos National Lab | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Los Alamos National Lab NNSA labs fight fire with simulation Fire season is in full swing in the driest parts of the United States, and capabilities of NNSA's labs are helping equip firefighters in the heated battle to save property and environment. NNSA's labs are perfectly suited to support emergency response related to fire. A long history of... NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's

  20. Statistical Analysis of Tank 5 Floor Sample Results

    SciTech Connect (OSTI)

    Shine, E. P.

    2013-01-31

    Sampling has been completed for the characterization of the residual material on the floor of Tank 5 in the F-Area Tank Farm at the Savannah River Site (SRS), near Aiken, SC. The sampling was performed by Savannah River Remediation (SRR) LLC using a stratified random sampling plan with volume-proportional compositing. The plan consisted of partitioning the residual material on the floor of Tank 5 into three non-overlapping strata: two strata enclosed accumulations, and a third stratum consisted of a thin layer of material outside the regions of the two accumulations. Each of three composite samples was constructed from five primary sample locations of residual material on the floor of Tank 5. Three of the primary samples were obtained from the stratum containing the thin layer of material, and one primary sample was obtained from each of the two strata containing an accumulation. This report documents the statistical analyses of the analytical results for the composite samples. The objective of the analysis is to determine the mean concentrations and upper 95% confidence (UCL95) bounds for the mean concentrations for a set of analytes in the tank residuals. The statistical procedures employed in the analyses were consistent with the Environmental Protection Agency (EPA) technical guidance by Singh and others [2010]. Savannah River National Laboratory (SRNL) measured the sample bulk density, nonvolatile beta, gross alpha, and the radionuclide1, elemental, and chemical concentrations three times for each of the composite samples. The analyte concentration data were partitioned into three separate groups for further analysis: analytes with every measurement above their minimum detectable concentrations (MDCs), analytes with no measurements above their MDCs, and analytes with a mixture of some measurement results above and below their MDCs. The means, standard deviations, and UCL95s were computed for the analytes in the two groups that had at least some measurements

  1. Headquarters Facilities Master Security Plan - Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy , Physical Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security 2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security This chapter covers the procedures adopted by HQ to implement directives governing the physical protection of U.S security interests. These procedures include control of employee and visitor access to HQ buildings, detection and control of dangerous devices, issuance of security badges to HQ

  2. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  3. National Security, Weapons Science

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Safety National Security & Safety In the video above, three veterans discuss how the skills they learned in the service are helping them advance energy security and grow the clean energy economy. The veterans shared their experiences at a Champions of Change event at the White House. | Video by Matty Greene, Energy Department. The Energy Department plays an important and multifaceted role in protecting national security. In addition to our work to increase nuclear nonproliferation and ensure

  4. Security | Argonne National Laboratory

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  5. Energy Security/Resiliency

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security/Resiliency Energy Security is "having assured access to reliable supplies of energy and the ability to protect and deliver sufficient energy to meet mission essential requirements" - FY2012, National Defense Authorization Act (NDAA) Resiliency is "the ability to anticipate, prepare for, and adapt to changing conditions and withstand, respond to, and recover rapidly from disruptions" - E.O. 13653 Key elements of Energy Security/Resiliency Planning Energy

  6. National Security Science

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Science National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear weapons and in science for national and global security April 2016 july 2015 The Hurt-Locker School Explosive Results Questing for the Holy Grail of High Explosives Learning from (Near) Disaster A Safer Liftoff Shake, Rattle, and Roll Manhattan Project National Historical Park Strategic Deterrent Forces Charting a

  7. Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example

    SciTech Connect (OSTI)

    Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling and quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.

  8. Experimental study on the floor-supply displacement ventilation system

    SciTech Connect (OSTI)

    Akimoto, Takashi; Nobe, Tatsuo; Takebayashi, Yoshihisa

    1995-12-31

    These results are presented from a research project to investigate the effects of a floor-supply displacement ventilation system with practical indoor heat loads. The experiments were performed in an experimental chamber (35.2 m{sup 2}) located in a controlled environment chamber. Temperature distributions were measured at seven heights throughout the experimental chamber for each test condition. Data were analyzed to observe thermal stratification as affected by lighting, occupants, and heat loads (personal computers), and its disruption caused by walking and change of air volume. In addition, airflow characteristics and ventilation efficiencies were investigated using a smoke machine, tobacco smoke, dust for industrial testing, and a tracer gas (CO{sub 2}) step-up procedure.

  9. SecuritySmart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  10. National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  11. Sandia Energy - Water Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  12. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  13. Cyber and Physical Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  14. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  15. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  16. Supervisory Industrial Security Specialist

    Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  17. Sandia Energy - Water Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  18. Cyber Security Architecture Guidelines

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  19. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  20. Provision of mobile and man-portable radiation detection equipment;
  21. Regional cooperation on safeguards...

  22. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  1. Supervisory Security Specialist

    Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  2. Security | Department of Energy

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    ... that establishes the policies and procedures for a Human Reliability Program (HRP) in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). ...

  3. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  4. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  6. Security Administration Production Office,

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  7. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  8. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  9. 120 Years of U.S. Residential Housing Stock and Floor Space

    SciTech Connect (OSTI)

    Pinto de Moura, Maria C.; Smith, Steven J.; Belzer, David B.

    2015-08-11

    Energy consumption in the residential sector accounts for one-fifth of total U.S. energy consumption and energy-related CO2 emissions. Floor space is a major driver of building energy demand. This paper develops a historical time series of total residential floor space for 1891-2010 and examines the role of socio-economic drivers GDP, population and household size on floor space. Using primarily data from the U.S. Census Bureau, we develop new construction and vintage-disaggregated housing stock for three building types, and address various data inconsistency issues. An examination of the long-term relationship of GDP and total residential floor space shows a remarkably constant trend over the period. While population increases five times over the period, a 50% decrease in household size contributes towards a tenfold increase in the number of housing units and floor space, while average floor space per unit remains surprisingly constant, as a result of housing retirement dynamics. In the last 30 years, however, these trends appear to be changing, as household size shows signs of leveling off, or even increasing again, while average floor space per unit has been increasing. Total residential sector primary energy consumption and floor space show a similar growth trend over the last 60 years.

  10. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  11. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  12. Information Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  13. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  14. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  15. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  16. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  17. Information Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  18. From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    From Hydrogen Fuel Cells to High-Altitude-Pilot Protection Suits- Mound Science and Energy Museum Programs Cover a Wide Range of Topics From Hydrogen Fuel Cells to ...

  19. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  20. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  1. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  2. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  3. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  4. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  5. National Security Technology Center | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Global Security / Security and Training / National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities section, which includes a printable fact sheet, for more about what we can do and how we can accomplish it. For specific examples of security devices currently in development or already deployed, explore the new technologies section. Several of our innovative technologies have received recent media coverage focusing on

  6. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  7. Calutron construction | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    construction Calutron construction Construction workers pour the concrete floor and footers for a Y-12 Calutron process building

  8. Tag: Global Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  9. Office of Radiological Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  10. Y-12 National Security Campus | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  11. Safeguards and Security and Cyber Security RM | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. Safeguards and Security and Cyber Security RM (2.31 MB) More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 Standard Review Plan -

  12. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  13. Departmental Cyber Security Management Policy

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  14. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  15. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  16. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  17. Security Enforcement Documents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Enforcement Documents Security Enforcement Documents Documents Available for Download September 8, 2016 Enforcement Letter, Sandia Corporation Security Enforcement Letter issued to Sandia Corporation regarding two classified information security incidents September 23, 2015 Enforcement Letter, Los Alamos National Security, LLC Security Enforcement Letter issued to Los Alamos National Security, LLC July 31, 2015 Final Notice of Violation, Los Alamos National Security, LLC Security

  18. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  19. Voluntary Protection Program Onsite Review, National Security...

    Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  20. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  1. PRIVACY/SECURITY NOTICE

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  2. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  3. Saran-Chloropel plastic suit worker dose rates from airborne tritium exposure - first exposure hour

    SciTech Connect (OSTI)

    Edwards, T.

    1993-04-20

    Radiological Engineering was requested to develop Tritium Stay Time Chart dose rates for the 9 mil Saran-Chloropel (CPE) plastic suit for a period of one hour or less. Assumptions utilized in previous calculations were revised to better address the first hour of exposure in the suit for emergency situations.

  4. Classification and storage of wastewater from floor finish removal operations

    SciTech Connect (OSTI)

    Hunt, C.E.

    1996-05-01

    This study evaluates the wastewater generated from hard surface floor finish removal operations at Lawrence Livermore Laboratory in order to determine if this wastewater is a hazardous waste, either by statistical evaluation, or other measurable regulatory guidelines established in California Regulations. This research also comparatively evaluates the 55 gallon drum and other portable tanks, all less than 1,000 gallons in size in order to determine which is most effective for the management of this waste stream at Lawrence Livermore Laboratory. The statistical methods in SW-846 were found to be scientifically questionable in their application to hazardous waste determination. In this statistical evaluation, the different data transformations discussed in the regulatory guidance document were applied along with the log transformation to the population of 18 samples from 55 gallon drums. Although this statistical evaluation proved awkward in its application, once the data is collected and organized on a spreadsheet this statistical analysis can be an effective tool which can aid the environmental manager in the hazardous waste classification process.

  5. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  6. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  7. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  8. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  9. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  10. About SRNL - Directorates - National Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  11. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  12. Accomplishments | National Nuclear Security Administration |...

    National Nuclear Security Administration (NNSA)

    ... In FY 2009, ASC released improved codes to support stockpile stewardship and other nuclear security missions, including secure transportation, NSE infrastructure, and nuclear ...

  13. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  14. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  15. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  16. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  17. Los Alamos National Security, LLC

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  18. 120 years of U.S. residential housing stock and floor space

    DOE PAGES-Beta [OSTI]

    Moura, Maria Cecilia P.; Smith, Steven J.; Belzer, David B.; Zhou, Wei -Xing

    2015-08-11

    Residential buildings are a key driver of energy consumption and also impact transportation and land-use. Energy consumption in the residential sector accounts for one-fifth of total U.S. energy consumption and energy-related CO₂ emissions, with floor space a major driver of building energy demands. In this work a consistent, vintage-disaggregated, annual long-term series of U.S. housing stock and residential floor space for 1891–2010 is presented. An attempt was made to minimize the effects of the incompleteness and inconsistencies present in the national housing survey data. Over the 1891–2010 period, floor space increased almost tenfold, from approximately 24,700 to 235,150 million squaremore » feet, corresponding to a doubling of floor space per capita from approximately 400 to 800 square feet. While population increased five times over the period, a 50% decrease in household size contributed towards a tenfold increase in the number of housing units and floor space, while average floor space per unit remains surprisingly constant, as a result of housing retirement dynamics. In the last 30 years, however, these trends appear to be changing, as household size shows signs of leveling off, or even increasing again, while average floor space per unit has been increasing. GDP and total floor space show a remarkably constant growth trend over the period and total residential sector primary energy consumption and floor space show a similar growth trend over the last 60 years, decoupling only within the last decade.« less

  19. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  20. Alamos National Security, LLC

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  1. Alamos National Security, LLC

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits...

  2. Alamos National Security, LLC

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  3. Safety and Security Officer

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  4. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  5. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  6. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  7. Operations Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  8. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  9. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  10. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  11. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  12. Energy Security Council

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  13. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  14. Incidents of Security Concern

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  15. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  16. NNSA orders security enhancements

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    NNSA orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to stop at the East and West Jemez Road "Vehicle Access Portals" (VAPs) for a vehicle check. December 21, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience,

  17. Well Logging Security Initiatives | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  18. Security and Training | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  19. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  20. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  1. Office of Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero,

  2. Broader National Security Missions | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  3. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  4. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  5. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  6. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  7. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  8. Property:Building/FloorAreaHealthServices24hr | Open Energy Informatio...

    Open Energy Information (Open El) [EERE & EIA]

    Jump to: navigation, search This is a property of type Number. Floor area for 24-hour health services Retrieved from "http:en.openei.orgwindex.php?titleProperty:Building...

  9. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  10. Comparison of two methods to quantify cyber and physical security effectiveness.

    SciTech Connect (OSTI)

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  11. Italy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Italy NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of

  12. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  13. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is

  14. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear

  15. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified

  16. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  17. Energy and national security.

    SciTech Connect (OSTI)

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  18. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  19. Biological and Chemical Security

    SciTech Connect (OSTI)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  20. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  1. Secure content objects

    DOE Patents [OSTI]

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  2. SNR Denton US LLP 1301 K Street, NW Suite 600, East Tower Washington...

    Energy.gov (indexed) [DOE]

    SNR Denton US LLP 1301 K Street, NW Suite 600, East Tower Washington, DC 20005-3364 USA Thomas C. Jensen Partner thomas.jensen@snrdenton.com D +1 202 408 3956 M 703 304 5211 T +1 ...

  3. C/O HELP PLLC, 750 SEVENTEETH STREET N.W. SUITE 900 Washington...

    Energy.gov (indexed) [DOE]

    WIRES Husch Blackwell LLP Hoecker Energy Law & Policy 750 Seventeenth St., N.W. Suite ... J. Hoecker Counsel to WIRES Husch Blackwell LLP Hoecker Energy Law & Policy 750 17th St. ...

  4. DC Pro Software Tool Suite, Data Center Fact Sheet, Industrial Technologies Program

    SciTech Connect (OSTI)

    Not Available

    2009-04-01

    This fact sheet describes how DOE's Data Center Energy Profiler (DC Pro) Software Tool Suite and other resources can help U.S. companies identify ways to improve the efficiency of their data centers.

  5. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect (OSTI)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  6. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  7. Alamos National Security, LLC

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  8. Technical Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  9. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term

  10. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest

  11. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  12. Browser Testing Suite for Websites Outside of the Energy.gov Drupal

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Environment | Department of Energy Energy.gov Content Management System » Quality Assurance Checklists » Browser Testing Suite for Websites Outside of the Energy.gov Drupal Environment Browser Testing Suite for Websites Outside of the Energy.gov Drupal Environment When developing an EERE website or application outside the Energy.gov Drupal environment, you are required to test its performance on the browsers most used by EERE's visitors: Microsoft Internet Explorer 11 Firefox Google Chrome

  13. Technical bases for plastic suit reduction factors against airborne tritium exposure

    SciTech Connect (OSTI)

    Edwards, T.

    1993-04-19

    Radiological Engineering was requested to provide bases for certain Tritium Stay Time Charts. These charts had evidently been developed by calculating stay times based upon unprotected exposure to HTO concentrations in air and applying correction factors according to the type of plastic suit being worn. No technical justification could be found for results given for 12 mil and 9 mil plastic suits. On the basis of available empirical data, the stay time charts were revised.

  14. Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Monitoring and Diagnostic System - 2013 BTO Peer Review | Department of Energy Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System - 2013 BTO Peer Review Rooftop Unit Suite: RTU Challenge, RTU Advanced Controls and RTU Smart Monitoring and Diagnostic System - 2013 BTO Peer Review Commercial Buildings Integration Project for the 2013 Building Technologies Office's Program Peer Review commlbldgs16_brambley_040413.pdf (1.52 MB) More Documents &

  15. The Department of Energy Respiratory Acceptance Program for Supplied-Air Suits

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-04

    The supplied-air suits that protect DOE contractor and federal employees from exposure to harmful atmospheres and radioactive contaminants are not included in the National Institute for Occupational Safety and Health (NIOSH) certification process for respiratory protective devices. Therefore, with the awareness and acknowledgement of NIOSH and the Occupational Safety and Health Administration (OSHA), the Department established a system for acceptance testing of supplied-air suits.

  16. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  17. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2016-07-12

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  18. Information Security Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  19. Information Security Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  20. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  1. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  2. Headquarters Security Operations

    Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  3. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  4. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  5. National Security System Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  6. Information Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  7. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  8. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 0930...

  9. AUDIT REPORT Security at the Nevada National Security Site

    Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  10. Tag: national security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    national security Tag: national security Displaying 1 - 1 of 1... Category: News CNS and Knoxville Building and Construction Trades Council reach new agreement CNS management is pleased discussions between the two parties have resulted in a new labor agreement

  11. Sandia National Laboratories: National Security Missions: Global Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Programs Global Security Reducing cyber threats Tools and techniques to improve cyber defense and protect networks and data Reducing global chemical and biological dangers Technologies for rapid detection and characterization of chemical and biological threats Reducing global nuclear dangers Unique technical and policy solutions to reduce global nuclear and radiological dangers Cyber Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the

  12. Office of Radiological Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security The mp4 video format is not supported by this browser. Download video Captions: On Time: 3:37

  13. Inherent secure communications using lattice based waveform design.

    SciTech Connect (OSTI)

    Pugh, Matthew Owen

    2013-12-01

    The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the ability of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.

  14. Dark matter vs. neutrinos: the effect of astrophysical uncertainties and timing information on the neutrino floor

    SciTech Connect (OSTI)

    Davis, Jonathan H.

    2015-03-09

    Future multi-tonne Direct Detection experiments will be sensitive to solar neutrino induced nuclear recoils which form an irreducible background to light Dark Matter searches. Indeed for masses around 6 GeV the spectra of neutrinos and Dark Matter are so similar that experiments are said to run into a neutrino floor, for which sensitivity increases only marginally with exposure past a certain cross section. In this work we show that this floor can be overcome using the different annual modulation expected from solar neutrinos and Dark Matter. Specifically for cross sections below the neutrino floor the DM signal is observable through a phase shift and a smaller amplitude for the time-dependent event rate. This allows the exclusion power to be improved by up to an order of magnitude for large exposures. In addition we demonstrate that, using only spectral information, the neutrino floor exists over a wider mass range than has been previously shown, since the large uncertainties in the Dark Matter velocity distribution make the signal spectrum harder to distinguish from the neutrino background. However for most velocity distributions it can still be surpassed using timing information, and so the neutrino floor is not an absolute limit on the sensitivity of Direct Detection experiments.

  15. Secure key storage and distribution

    SciTech Connect (OSTI)

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  16. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Tools Security Minutes New! SIMP Late Reporting Social Media Email Association Official Use Only (OUO) Majordomo Email List Risks Email Vacating Spaces Reporting Monitors Review and Approval Top of page

  17. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    This order cancels DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011, Physical ...

  18. Departmental Personnel Security- Clearance Automation

    Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  19. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    References: PERSEC F 5633.33, NNSA Personnel Security Clearance Action Request DOE F ... All SNL Members of the Worksforce granted a DOE Security Clearance are required to obtain ...

  20. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  1. Jeffrey R. Johnson | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    In that position, he was responsible for nuclear weapons security policy, security evaluations of Navy nuclear weapons facilities, and provided policy while coordinating security ...

  2. DOE - NNSA/NFO -- National Security Template

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Homeland Security NNSANFO Language Options U.S. DOENNSA - Nevada Field Office Homeland Security The U.S. Department of Energy (DOE) National Nuclear Security Administration ...

  3. Secure NEPA Documents | Department of Energy

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security ...

  4. Independent Oversight Review, Nevada National Security - May...

    Office of Environmental Management (EM)

    National Security - May 2013 Independent Oversight Review, Nevada National Security - May 2013 May 2013 Review of the Nevada National Security Site Criticality Safety Program ...

  5. Energy Surety: A Matter of National Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    and loads in an efficient and secure paradigm Secure Scalable Microgrid (SSM) The secure scalable microgrid (SSM) is a Sandia-developed grid architecture that divorces away ...

  6. Technical Security Program - DOE Directives, Delegations, and...

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  7. Waste Isolation Pilot Plant Transportation Security | Department...

    Office of Environmental Management (EM)

    Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security (2.41 MB) More Documents & Publications Enterprise ...

  8. Safeguards and Security Program - DOE Directives, Delegations...

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  9. April 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

  10. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  11. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  12. Asian Energy Security

    SciTech Connect (OSTI)

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  13. David Telles wins NNSA Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    David Telles wins NNSA Security Professional of the Year award May 7, 2009 LOS ALAMOS, New Mexico, May 7, 2009 - David M. Telles, who leads Los Alamos National Laboratory's Vulnerability Analysis Office, received a 2008 National Nuclear Security Administration Security Professional of the Year award. NNSA administrator Tom D'Agostino said, "Our security professionals dedicate themselves to protecting some of the nation's most vital strategic assets, and in so doing, help advance broader

  14. accountability | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    accountability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  15. transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  16. LEU | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    LEU NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... DOE/NNSA Successfully Establishes Uranium Lease and Takeback Program to Support Critical Medical Isotope Production In January 2016,

  17. NNSA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense

  18. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD NNSA program strengthens national security from afar The Nuclear Smuggling Detection and Deterrence (NSDD) program is a key component of NNSA's core mission to reduce nuclear threats. The program, part of NNSA's Office of Defense Nuclear Nonproliferation, provides partners tools and training to deter, detect, and investigate smuggling of... NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security

  19. Secure computing for the 'Everyman'

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Secure computing for the 'Everyman' Secure computing for the 'Everyman' If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. September 2, 2014 This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information

  20. Protocol, Security Assistance- January 2007

    Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  1. Cyber Security Process Requirements Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  2. Safeguard Security and Awareness Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  3. Safeguards and Security Program References

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  4. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset

  5. nnss | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nnss NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Contract Award Provides Best

  6. ors | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ors NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  7. Support of Gulf of Mexico Hydrate Research Consortium: Activities of Support Establishment of a Sea Floor Monitoring Station Project

    SciTech Connect (OSTI)

    J. Robert Woolsey; Thomas McGee; Carol Lutken

    2008-05-31

    documents including the Final Technical Report to DOE covering Cooperative Agreement DEFC26-00NT40920 and Semiannual Progress Reports for this award, DE-FC26-02NT41628. Initial components of the observatory, a probe that collects pore-fluid samples and another that records sea floor temperatures, were deployed in MC118 in May of 2005. Follow-up deployments, planned for fall 2005, had to be postponed due to the catastrophic effects of Hurricane Katrina (and later, Rita) on the Gulf Coast. SFO completion, now anticipated for 2009-10, has, therefore, been delayed. Although delays caused scheduling and deployment difficulties, many sensors and instruments were completed during this period. Software has been written that will accommodate the data that the station retrieves, when it begins to be delivered. In addition, new seismic data processing software has been written to treat the peculiar data to be received by the vertical line array (VLA) and additional software has been developed that will address the horizontal line array (HLA) data. These packages have been tested on data from the test deployments of the VLA and on data from other, similar, areas of the Gulf (in the case of the HLA software). During the life of this Cooperative Agreement (CA), the CMRET conducted many cruises. Early in the program these were executed primarily to survey potential sites and test sensors and equipment being developed for the SFO. When MC118 was established as the observatory site, subsequent cruises focused on this location. Beginning in 2005 and continuing to the present, 13 research cruises to MC118 have been conducted by the Consortium. During September, 2006, the Consortium was able to secure 8 days aboard the R/V Seward Johnson with submersible Johnson SeaLink, a critical chapter in the life of the Observatory project as important documentation, tests, recoveries and deployments were accomplished during this trip (log appended). Consortium members have participated materially in a

  8. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  9. Armenia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Armenia Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  10. Nuclear Safeguards and Security Challenge:

    National Nuclear Security Administration (NNSA)

    Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards

  11. nest | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nest Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management Coordination HQ Emergency Management Team Responding to Emergencies Consequence Management First Responders Operations Render Safe Nuclear Forensics International... Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security Council-sponsored policy initiative that establishes

  12. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2016-07-12

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  13. National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ($ Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon Activities 241 242 252 10 Mixed Oxide Fuel Fabrication Facility (MOX) 340 332 270 (62) Defense Nuclear Nonproliferation (DNN) 77 58 91 33 Federal Expenses 4.7 5.2 5.4 .2 Total Budget for NNSA at SRS 662.7 637.2 618.4 (18.8)

  14. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Global Security 2009

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    523744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch

  16. Equation-of-State Test Suite for the DYNA3D Code

    SciTech Connect (OSTI)

    Benjamin, Russell D.

    2015-11-05

    This document describes the creation and implementation of a test suite for the Equationof- State models in the DYNA3D code. A customized input deck has been created for each model, as well as a script that extracts the relevant data from the high-speed edit file created by DYNA3D. Each equation-of-state model is broken apart and individual elements of the model are tested, as well as testing the entire model. The input deck for each model is described and the results of the tests are discussed. The intent of this work is to add this test suite to the validation suite presently used for DYNA3D.

  17. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Energy Savers

    Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security ...

  18. Testing the Floor Scale Designated for Pacific Northwest National Laboratory's UF6 Cylinder Portal Monitor

    SciTech Connect (OSTI)

    Curtis, Michael M.; Weier, Dennis R.

    2009-03-12

    Pacific Northwest National Laboratory (PNNL) obtained a Mettler Toledo floor scale for the purpose of testing it to determine whether it can replace the International Atomic Energy Agency’s (IAEA) cumbersome, hanging load cell. The floor scale is intended for use as a subsystem within PNNL’s nascent UF6 Cylinder Portal Monitor. The particular model was selected for its accuracy, size, and capacity. The intent will be to use it only for 30B cylinders; consequently, testing did not proceed beyond 8,000 lb.

  19. Santa | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Santa Santa Even Santa was subjected to security checks

  20. Can an Iron Man Suit Be Made?: Science Behind Superheroes | GE Global

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Research Can an Iron Man Suit Be Made?: Science Behind Superheroes Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) Can an Iron Man Suit Be Made?: Science Behind Superheroes Rick Arthur 2013.06.17 On Friday, I hosted a live Reddit Q&A on the Science Behind Superheroes along with several other GE researchers,

  1. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    SciTech Connect (OSTI)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  2. Office of Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Office of Security Mission The Office of Security maintains and promotes the Department of Energy's corporate security strategies for the preservation of National Security and protection of critical assets entrusted to the Department. The Office of Security executes this mission through the development and promulgation of safeguards and security policy, by providing comprehensive security expertise to assist Headquarters and field elements in planning site protection strategies and

  3. Departmental Personnel Security - Implementation Guidance | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Departmental Personnel Security - Implementation Guidance Implementation Guidance Overview of Security ClearanceAccess Authorization Process for Applicants Drug Testing ...

  4. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    violations of Department of Energy's classified information security program ... Sheet, Preliminary Notice of Violation: Classified Information Security Event at NNSS ...

  5. National Nuclear Security Administration Appropriation and Program...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security Administration ...

  6. Microsoft Word - Critical Infrastructure Security and Resilience...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2013 CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE MONTH, 2013 - - - - - - - BY THE ...

  7. Nevada National Security Site | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point Nevada National Security Site's (NNSS) current mission includes support for the NNSA stockpile stewardship program, which includes performing subcritical experiments in support of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and

  8. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  9. Dye filled security seal

    DOE Patents [OSTI]

    Wilson, Dennis C. W.

    1982-04-27

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

  10. Security - VOLTTRON 2016

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security CRAIG ALLWARDT August 11, 2016 1 Pacific Northwest National Laboratory VOLTTRON TM 2016 PNNL-SA-119968 Overview ► Background ► Creating keys and authorization. ► Demo August 11, 2016 2 Background ► ZeroMQ's ZeroMQ Authentication Protocol (ZAP) ■ http://rfc.zeromq.org/spec:27/ZAP/ ■ Eliptic Curve ■ Long term public and secret key ■ Short term communication keys based upon the public and secret key. ► VOLTTRON TM Interconnect Protocol (VIP) ■

  11. Army Energy Security Considerations

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed

  12. Fleet-Wide Prognostic and Health Management Suite: Asset Fault Signature Database

    SciTech Connect (OSTI)

    Vivek Agarwal; Nancy J. Lybeck; Randall Bickford; Richard Rusaw

    2015-06-01

    Proactive online monitoring in the nuclear industry is being explored using the Electric Power Research Institute’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. The FW-PHM Suite is a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. The FW-PHM Suite has four main modules: (1) Diagnostic Advisor, (2) Asset Fault Signature (AFS) Database, (3) Remaining Useful Life Advisor, and (4) Remaining Useful Life Database. The paper focuses on the AFS Database of the FW-PHM Suite, which is used to catalog asset fault signatures. A fault signature is a structured representation of the information that an expert would use to first detect and then verify the occurrence of a specific type of fault. The fault signatures developed to assess the health status of generator step-up transformers are described in the paper. The developed fault signatures capture this knowledge and implement it in a standardized approach, thereby streamlining the diagnostic and prognostic process. This will support the automation of proactive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

  13. Safeguards & Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Safeguards & Security Sandia Field Office's Safeguards and Security (S&S) office is responsible for providing oversight and contract administration for all Sandia National Laboratories activities related to S&S. S&S provides oversight to ensure the effective implementation of the overall S&S program at Sandia National Laboratories to include the following: program management, protection program operations, nuclear material control and accountability, information security and

  14. office of secure transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    office of secure transportation Eight new couriers make the grade, join NNSA's Office of Secure Transportation Earlier this month, the Office of Secure Transportation (OST) welcomed eight new Nuclear Material Courier Federal Agents into the fold during a graduation ceremony at Kirtland Air Force Base in Albuquerque, NM. The selection process is rigorous for this vital position, and fewer than 2 percent of... Acquisition and Project Management Office volunteers get up-close look at Office of

  15. New institute promotes nuclear security | Y-12 National Security...

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    New institute promotes ... New institute promotes nuclear security Posted: February 11, ... experience to help solve international nuclear challenges? "A lot of the keys for ...

  16. Office of Radiological Security: extended | Y-12 National Security Complex

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security: extended The mp4 video format is not supported by this browser. Download video Captions: On Time: 8:19

  17. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    This document reviews several key operational cyber security elements that are important for control systems and industrial networks and how those elements can drive the creation ...

  18. LBNL SecureMessaging

    SciTech Connect (OSTI)

    Pery, Marcia; Agarwal, Deb

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanent and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.

  19. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  20. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  1. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  2. LBNL SecureMessaging

    Energy Science and Technology Software Center (OSTI)

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanentmore » and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.« less

  3. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  4. Safeguards and Security Program

    Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  5. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  6. policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA Deputy promotes collaboration on global deterrence at USSTRATCOM deterrence symposium Last month more than 650

  7. DOE | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    DOE DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA & DOE Employees Use Tiny Smartphone Microscopes to Teach STEM Users discovered items the device could magnify, such

  8. Principal Associate Director - Global Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  9. China | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    China U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... NNSA Deputy Administrator Creedon Travels to China In March, National Nuclear Security

  10. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    budget National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today... FY2016 Budget Request: Positioned for the 21st Century Mission Delivery Washington, DC - U.S. Department of Energy

  11. cdns | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cdns Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes,

  12. contracts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    contracts NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... NNSA Makes Up to $200 Million in Awards to Five Small Business Teams for Enterprise-Wide Management, Organizational and Administrative Support

  13. operations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    operations NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building... Infrastructure and Operations NNSA's missions require a secure production and laboratory infrastructure meeting immediate and long term needs. The

  14. ost | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ost Eight new couriers make the grade, join NNSA's Office of Secure Transportation Earlier this month, the Office of Secure Transportation (OST) welcomed eight new Nuclear Material Courier Federal Agents into the fold during a graduation ceremony at Kirtland Air Force Base in Albuquerque, NM. The selection process is rigorous for this vital position, and fewer than 2 percent of... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense

  15. rsl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiation Monitoring Survey over Boston April 17-20 BOSTON - The National Nuclear Security Administration (NNSA) will measure naturally occurring background radiation over areas ...

  16. Thailand | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Thailand NNSA Transitions Radiation Detection System at Port of Laem Chabang to Thailand LAEM CHABANG, Thailand - The U.S. Embassy in Thailand, the National Nuclear Security ...

  17. administrator | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    of Energy's Undersecretary for Nuclear Security and NNSA Administrator in a private ceremony this afternoon. General Klotz was joined by his wife, Nancy, and Acting ...

  18. Newsletters | National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    the nuclear security enterprise. Online archives are available back to 2003. NNSA publishes a monthly newsletter featuring current events and activities across the nuclear ...

  19. performance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    performance | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  20. computing | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    computing | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. sites | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    sites | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. ap | National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    ap | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  3. lllnl | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    lllnl | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  4. associates | National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    associates | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  5. Links | National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Links | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. npo | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget Fifth Anniversary of Radiological Alarm Response Training for Local Law Enforcement and First ...

  7. fleet | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    fleet | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. VPP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    VPP | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  9. NSTec | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  10. Savannah | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  11. green | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

  12. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of ...

  13. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of ...

  14. accreditation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA's safety office accredited and recognized for leadership in safe operation of defense nuclear facilities Part of NNSA's commitment to maintaining the nation's safe, secure, ...

  15. preparedness | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness NNSA & Nuclear Security Enterprise support nation's preparedness Scientists at NNSA facilities study climate and meteorology. Other sites are key players in weather ...

  16. readiness | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    readiness NNSA & Nuclear Security Enterprise support nation's preparedness Scientists at NNSA facilities study climate and meteorology. Other sites are key players in weather ...

  17. TQP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA's safety office accredited and recognized for leadership in safe operation of defense nuclear facilities Part of NNSA's commitment to maintaining the nation's safe, secure, ...

  18. weather | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    weather NNSA & Nuclear Security Enterprise support nation's preparedness Scientists at NNSA facilities study climate and meteorology. Other sites are key players in weather ...

  19. #meetamachine | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    which helps NNSA ensure a safe, secure, effective nuclear deterrent. Thor is different from previous pulsed-power accelerators, which are comprised of a few massive ...

  20. SSAC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    SSAC NNSA and IAEA Hold the 20th International Training Course on Nuclear Material Accounting and Control Washington, D.C. - The National Nuclear Security Administration (NNSA)...

  1. ONAC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ONAC NNSA and IAEA Hold the 20th International Training Course on Nuclear Material Accounting and Control Washington, D.C. - The National Nuclear Security Administration (NNSA)...

  2. Secure computing for the "Everyman"

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Latest Issue:September 2015 all issues All Issues submit Secure computing for the "Everyman" If implemented on a wide scale, quantum key distribution technology could ensure ...

  3. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    a Local Security Office (LSO) cited a DOE psychiatrist's diagnoses of Post-Traumatic Stress Disorder and Delusional Disorder. The Administrative Judge found that the individual...

  4. inspection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports

  5. recycling | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    recycling | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  6. women | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA labs and sites get girls excited about engineering NNSA workers across the nuclear security enterprise took advantage of "Introduce a girl to engineering day" to instill ...

  7. Cyber Security Process Requirements Manual

    Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  8. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons, nuclear weapons components, and special nuclear materials and conduct other ...

  9. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance ...

  10. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    - Classified Matter Channels Maretta King mking@sandia.gov 505-284-0827 Clearance Office - Clearance Reinvestigations security@sandia.gov 505-845-1321 - Clearance Terminations ...

  11. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an Information Systems Security Officer (ISSO) and as many Alternate ISSOs as ...

  12. Headquarters Facilities Master Security Plan

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    The servicing badge office provides information on how to access the online briefing. The ... The briefing includes an overview of HQ security programs, access control procedures, ...

  13. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  14. gms | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA Provides Tajikistan Specialized...

  15. radiation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, NNSA to Conduct Aerial Radiological...

  16. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Note: In circumstances where the potential danger associated with an item is questionable, consult the physical security contact for additional information. Illegal drugs (does not ...

  17. Center for Control System Security

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Control System Security Critical Infrastructure is at Risk As America's infrastructures have become more complex and interconnected, their operation and control has become more...

  18. aviation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    aviation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    alleged that the individual's admission that he had taken one of his dog's prescription pain pills (Tramadol) constituted illegal drug use which raised significant security...

  20. holiday | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    holiday | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  1. sliderphotos | National Nuclear Security Administration

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  2. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy(...

  3. Transportation Security | Department of Energy

    Office of Environmental Management (EM)

    Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste Shipment Indiana Department of Homeland...

  4. Library | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog NNSA & Nuclear Security Enterprise support nation's preparedness NNSA Blog NNSA's work aids in fight against cancer NNSA Blog NSC leader recognized as community role model...

  5. Compensation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Blog NNSA & Nuclear Security Enterprise support nation's preparedness NNSA Blog NNSA's work aids in fight against cancer NNSA Blog NSC leader recognized as community role model...

  6. Office of Global Material Security

    National Nuclear Security Administration (NNSA)

    at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In total, 55 participants from 15 countries and 9 international...

  7. Jamaica | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Jamaica Jamaica NNSA Removes U.S.-Origin HEU from Jamaica, Makes the Caribbean HEU Free WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration...

  8. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  9. seismic | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    how the gravitational tug of the sun and... NNSA administrator visits NNSS to meet team, see national security work Last month, Department of Energy Under Secretary for Nuclear ...

  10. leadership | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    for a facility tour of the new National Security Campus and to receive project briefings on its proliferation deterrence programs. During the visit, Harrington toured the... ...

  11. gtri | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    European Union and the United States of America, which actively promote the use of the highest safety, security and non-proliferation standards in countries using nuclear energy. ...

  12. Safeguards & Security | Department of Energy

    Energy Savers

    The mission of the PPPO Safeguards and Security Program is to effectively implement the Office of Environmental Management ... Serves as the Federal liaison with the Nuclear Regulatory ...

  13. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. Security Notice | Critical Materials Institute

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    User login Username * Password * Request new password Log in Forgot Your Password? Security Notice This computer system is operated on a U.S. Federal Government network ...

  15. Security and Privacy Notices | NREL

    U.S. Department of Energy (DOE) all webpages (Extended Search)

    Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory monitors this Web site for ...

  16. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    to administrative review citing as security concerns the individual's diagnosis of alcohol abuse and his alcohol-related arrests. After conducting a hearing, convened at the...

  17. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    of the individual to address concerns about his falsification of information and alcohol use. The individual's behavior raised security concerns under Criteria F, H and L....

  18. Chapter_11_Incidents_of_Security_Concern

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. AU-42 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect

  19. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK November 19, 2015 WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration ...

  20. Ultra Wideband (UWB) communication vulnerability for security applications.

    SciTech Connect (OSTI)

    Cooley, H. Timothy

    2010-07-01

    RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages over conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.