National Library of Energy BETA

Sample records for related links security

  1. Related Links | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Related Links NNSA and Other Related Links DOE/NNSA Phonebook Freedom of Information Act Department of Energy DOE Directives DOE Jobs Online Defense Nuclear Facilities Safety Board DOE Pulse Publication DOE Office of Health, Safety and Security USA.Gov Los Alamos County Los Alamos National Laboratory LANL Phonebook National Nuclear Security Administration NNSA Service Center - Albuquerque NNSA Nevada Field Office New Mexico Environmental Department - LANL Sandia National Laboratories Waste

  2. Related Links | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Related Links NNSA Lab Directed Research and Development (LDRD) Lab Directed Research and Development Collaborations DOE Adanced Scientific Computing Research DTRA (Defense Threat Reduction Agency) NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design Centers Supercomputing Top 500 List ASC at Supercomputing Conference General Information ASC at the Labs How ASC Supports

  3. Privacy Act Links to Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Links to Related Sites The Privacy Act of 1974 (Title 5, United States Code, Section 552a). The Federal Register is the official daily publication for Rules, Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains descriptions of Federal agency systems of records maintained on individuals and rules agencies follow to assist individuals who request

  4. Links | National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  5. Related Links - Hanford Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Related Links Hanford Advisory Board Convening Report SSAB Guidance Memorandum of Understanding Membership Nomination and Appointment Process Operating Ground Rules Calendars Advice and Responses Full Board Meeting Information Committee Meeting Information Outgoing Board Correspondence Key Board Products and Special Reports HAB Annual Report HAB and Committee Lists Points of Contact Related Links Related Links Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size

  6. ARM - Related Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Related Links Related Links TWP-ICE Home Tropical Western Pacific Home ARM Data Discovery Browse Data Post-Experiment Data Sets Weather Summary (pdf, 6M) New York Workshop Presentations Experiment Planning TWP-ICE Proposal Abstract Detailed Experiment Description Science Plan (pdf, 1M) Operations Plan (pdf, 321K) Maps Contact Info Related Links Daily Report Report Archives Press Media Coverage TWP-ICE Fact Sheet (pdf, 211K) Press Releases TWP-ICE Images ARM flickr site <=""

  7. Related Links | Department of Energy

    Office of Environmental Management (EM)

    Information Resources Related Links Related Links These resources provide more information about wind energy research within the United States and abroad. Consumer and ...

  8. Links | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Links NNSA HQ National Nuclear Security Administration Advanced Simulation & Computing NNSA Graduate Program NNSA Small Business Program Office of Defense Nuclear Nonproliferation Field Offices NNSA Albuquerque Complex Kansas City Field Office Livermore Field Office Los Alamos Field Office Naval Reactors Idaho Branch Office Nevada Field Office Sandia Field Office DOE Oak Ridge Sites Oak Ridge Office Oak Ridge National Laboratory UCOR Oak Ridge Institute for Science and Education Oak Ridge

  9. Related Links - Hanford Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links Tri-Party Agreement The Agreement Announcements List of Approved Changes TPA Project Manager's Lists Modifications for Public Comment Data Management MP-14 WIDS...

  10. Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Related Links Related Links Private, public, and nonprofit organizations around the country offer a wide range of courses and other services to help you either improve your current skills or learn new ones. The sites featured here can help you find courses of specific interest as well as other information about training requirements for certain energy jobs. DOE Related Advanced Manufacturing Office: Training Find training sessions in your area and learn how to save energy in your manufacturing

  11. LTS Related Links - Hanford Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Related Links About Us LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us LTS Related Links Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size Hanford Site Cleanup Completion Framework (DOE/RL 2009-10) (PDF) Hanford Long-Term Stewardship Program Plan (DOE/RL 2010-35) (PDF) DOE-EM LTS Site Legacy Management CERCLA 5 Year

  12. NREL: Energy Analysis - Related Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Related Links Here you'll find links to other programs, organizations, and information resources concerning other analysis capabilities, energy-modeling, and technology expertise related to renewable energy. International Applications NREL's International Program in its effort to promote the use of renewable energy as a tool for sustainable development, applies world-class expertise in technology development and deployment, economic analysis, resource assessment, project design and

  13. Alternative Fuels Data Center: Hydrogen Related Links

    Alternative Fuels and Advanced Vehicles Data Center

    Hydrogen Printable Version Share this resource Send a link to Alternative Fuels Data Center: Hydrogen Related Links to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Related Links on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Related Links on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Related Links on Google Bookmark Alternative Fuels Data Center: Hydrogen Related Links on Delicious Rank Alternative Fuels Data Center: Hydrogen Related Links on

  14. Alternative Fuels Data Center: Propane Related Links

    Alternative Fuels and Advanced Vehicles Data Center

    Propane Printable Version Share this resource Send a link to Alternative Fuels Data Center: Propane Related Links to someone by E-mail Share Alternative Fuels Data Center: Propane Related Links on Facebook Tweet about Alternative Fuels Data Center: Propane Related Links on Twitter Bookmark Alternative Fuels Data Center: Propane Related Links on Google Bookmark Alternative Fuels Data Center: Propane Related Links on Delicious Rank Alternative Fuels Data Center: Propane Related Links on Digg Find

  15. EEO Links | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Links DOE Office of Civil Rights Department Of Justice Civil Rights Division Department of Veterans Affairs Equal Employment Opportunity Commission Office of Personnel Management U.S. Merit Systems Protection Board U.S. Office of Special Counsel

  16. Alternative Fuels Data Center: Electricity Related Links

    Alternative Fuels and Advanced Vehicles Data Center

    Electricity Printable Version Share this resource Send a link to Alternative Fuels Data Center: Electricity Related Links to someone by E-mail Share Alternative Fuels Data Center: Electricity Related Links on Facebook Tweet about Alternative Fuels Data Center: Electricity Related Links on Twitter Bookmark Alternative Fuels Data Center: Electricity Related Links on Google Bookmark Alternative Fuels Data Center: Electricity Related Links on Delicious Rank Alternative Fuels Data Center: Electricity

  17. References & Links | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    References & Links 48CFR Chapter 9, Acquisition Regulation (DEAR) Department of Energy Acquisition Requirements (DEAR) DOE Order 470.4B, Safeguards and Security Program DOE Order 472.2, Personnel Security DOE Order 206.2 DOE Order 470.4B Executive Order 10865 Executive Order 12968 Federal Acquisition Regulation (FAR) Federal Bureau of Investigations FIPS PUB 201-2, Personal Identity Verification (PIV) of Federal Employees and Contractors Intelligence Reform and Terrorism Prevention Act of

  18. Related Links | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    NAS (National Academy of Sciences) NSF (National Science Foundation) DOD (Department of Defense) NASA Exascale Activities NNSA Exascale Environment Planning Workshop ASCR Co-Design ...

  19. Related Links | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Oak Ridge Heritage and Preservation Association Oak Ridge Art Center Oak Ridge Civic Music Association Oak Ridge Playhouse Univerity of Tennessee Arboretum Secret City Excursion...

  20. Fuel Cells Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Fuel Cells » Fuel Cells Related Links Fuel Cells Related Links The following resources provide details about U.S. Department of Energy (DOE)-funded fuel cell activities, research plans and roadmaps, partnerships, and additional related links. DOE-Funded Fuel Cell Activities Each year, hydrogen and fuel cell projects funded by DOE's Hydrogen and Fuel Cells Program are reviewed for their merit during an Annual Merit Review and Peer Evaluation Meeting. View posters and presentations from the

  1. Hydrogen Delivery Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Delivery » Hydrogen Delivery Related Links Hydrogen Delivery Related Links The following resources provide details about U.S. Department of Energy (DOE)-funded hydrogen delivery activities, research plans and roadmaps, models and tools, and additional related links. DOE-Funded Hydrogen Delivery Activities Each year, hydrogen and fuel cell projects funded by DOE's Hydrogen and Fuel Cells Program are reviewed for their merit during an Annual Merit Review and Peer Evaluation Meeting. View posters

  2. Hydrogen Production Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Production Related Links Hydrogen Production Related Links The following resources provide details about U.S. Department of Energy (DOE)-funded hydrogen production activities, research plans and roadmaps, models and tools, and additional related links. DOE-Funded Hydrogen Production Activities Each year, hydrogen and fuel cell projects funded by DOE's Hydrogen and Fuel Cells Program are reviewed for their merit during an Annual Merit Review and Peer Evaluation Meeting. View posters and

  3. Hydrogen Storage Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Related Links Hydrogen Storage Related Links The following resources provide details about U.S. Department of Energy (DOE)-funded hydrogen storage activities, research plans and roadmaps, models and tools, and additional related links. DOE-Funded Hydrogen Storage Activities Each year, hydrogen and fuel cell projects funded by DOE's Hydrogen and Fuel Cells Program are reviewed for their merit during an Annual Merit Review and Peer Evaluation Meeting. View posters and presentations from the latest

  4. Former Worker Medical Screening Program Related Documents & Links...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Related Documents & Links Former Worker Medical Screening Program Related Documents & Links Related Documents & Links Beryllium Information-ORISE Chronic Beryllium Disease ...

  5. Fuel Cell Technologies Manufacturing Related Links

    Energy.gov [DOE]

    The following resources provide details about U.S. Department of Energy-funded fuel cell technologies manufacturing activities, other EERE and federal manufacturing activities and initiatives, research plans and roadmaps, workshops, and additional related links.

  6. Thermochemical Conversion Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Conversion » Thermochemical Conversion Related Links Thermochemical Conversion Related Links Further reading about current Bioenergy Technologies Office R&D in the Thermochemical Platform can be found in this website's Information Resources section. Some key publications are: Biomass Conversion: From Feedstocks to Final Products (July 2016) Thermochemical Conversion 2009 Peer Review Design Case Summary: Production of Gasoline and Diesel from Biomass via Fast Pyrolysis, Hydrotreating, and

  7. Feedstock Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Related Links Feedstock Related Links There are a variety of other resources available for information on biomass feedstocks. We have organized some of those resources into the following categories: Other DOE Offices and Federal Agencies Department of Energy (DOE) Office of Science Biological and Environmental Research (BER) Biofuels Mission Focus DOE Office of Science BER Bioenergy Research Centers U.S. Department of Agriculture (USDA) 2007 Farm Bill Energy Provision USDA Agriculture Research

  8. Related Sites | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Related Sites Related Sites Links to the following sources of information are provided as resources. Listings are obtained from government, industry and trade organizations and from other resources. Government System for Award Management The System for Award Management (SAM) (formerly Central Contractor Registration-CCR) is the main database used by the U.S. Government for collection, validation, storage and dissemination of data in support of agency acquisition missions. DOE Small Business Site

  9. Securities Law Issues Relating to Community Solar Projects

    Energy.gov [DOE]

    The law firm Stoel Rives has analyzed the issues related to Securities Law and Community Solar both in the context of Washington state law and federal law.

  10. Alternative Fuels Data Center: Ethanol Related Links

    Alternative Fuels and Advanced Vehicles Data Center

    Water, Population and Communitie This page contains news and information related to fuel quality activities of Australia's Department of Sustainability, Environment, Water, ...

  11. Employment at EERE Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    » Employment at EERE Related Links Employment at EERE Related Links If you are considering employment with the U.S. Department of Energy (DOE) Office of Energy Efficiency and Renewable Energy (EERE), and even if you already are an EERE employee, you may find the following links helpful: Veterans' Employment Resources The American's Veteran site includes information to help you understand veterans' preference, how federal jobs are filled, and unique veteran appointing authorities designed to

  12. Towards a Relation Extraction Framework for Cyber-Security Concepts

    SciTech Connect

    Jones, Corinne L; Bridges, Robert A; Huffer, Kelly M; Goodall, John R

    2015-01-01

    In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed. As labeled text data is scarce and expensive, we follow developments in semi-supervised NLP and implement a bootstrapping algorithm for extracting security entities and their relationships from text. The algorithm requires little input data, specifically, a few relations or patterns (heuristics for identifying relations), and incorporates an active learning component which queries the user on the most important decisions to prevent drifting the desired relations. Preliminary testing on a small corpus shows promising results, obtaining precision of .82.

  13. Uniform Methods Project Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Project Related Links Uniform Methods Project Related Links The websites and publications listed below provide supporting information for the Uniform Methods Project and for evaluation, measurement, and verification (EM&V) of energy efficiency programs. Glossaries of EM&V Terms Federal EM&V Resources International Resources Related Standards Glossaries of EM&V Terms The following glossaries provide definitions of technical language and EM&V terms. Appendix A: Glossary of

  14. Voluntary Protection Program - Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    - Related Links Voluntary Protection Program - Related Links VPPPA - The Voluntary Protection Programs Participants' Association, a non- profit organization is leading the way in safety, health, and environmental excellence through cooperative efforts among labor, management, and government. http://www.vpppa.org. OSHA VPP - The United States Department of Labor, Occupational Safety and Health Administration - Voluntary Protection Program http://www.osha.gov/dcsp/vpp/index.html State VPP Programs

  15. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  16. Related Links | U.S. DOE Office of Science (SC)

    Office of Science (SC)

    Association for Computing Machinery External link Computing Research Association External link International Exascale Software Project External link Last modified: 352016 7:59:23

  17. E-Link - Disclaimer

    Office of Scientific and Technical Information (OSTI)

    Javascript Not Enabled OSTI Security Website Policies and Important Links

  18. Procurement-Related Forms | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Procurement-Related Forms Procurement-Related Forms The following procurement-related forms are provided in PDF fillable and/or Word format. Click the link in the "Format" column to open a copy of the form or right-click to download. To sort the table by UCN number or title, click the associated column heading. Number* Title/Description Format** UCN-04452S CNS Subcontractor Personnel Exit Checklist PDF-fil UCN-6573 Subcontractor's Invoice for Travel and/or Services PDF-fil UCN-13816B

  19. Property-Related Forms | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Property-Related Forms Property-Related Forms The following property-related forms are provided in PDF fillable format. Click the link in the "Format" column to open a copy of the form or right-click to download. Number* Title/Description Format** UCN-21041 Property Management System Approval Form PDF-fil UCN-21042 Transmittal Form PDF-fil UCN-21043 Inventory of Government Property PDF-fil UCN-21044 Lost Property Form PDF-fil UCN-21069 High-Risk Property Checklist PDF-fil UCN-22325

  20. Hybrid Multidimensional Relational and Link Analytical Knowledge Discovery for Law Enforcement

    SciTech Connect

    Joslyn, Cliff A.; Gillen, David S.; Burke, John S.; Critchlow, Terence J.; Damante, Matt; Fernandes, Robert

    2008-08-01

    The challenges facing the Department of Homeland Security (DHS) require not only multi-dimensional, but also multi-scale data analysis. In particular, the ability to seamlessly move from summary information, such as trends, into detailed analysis of individual entities, while critical for law enforcement, typically requires manually transferring information among multiple tools. Such time-consuming and error prone processes significantly hamper the analysts' ability to quickly explore data and identify threats. As part of a DHS Science and Technology effort, we have been developing and deploying for Immigration and Customs Enforcement the CubeLink system integrating information between relational data cubes and link analytical semantic graphs. In this paper we describe CubeLink in terms of the underlying components, their integration, and the formal mapping from multidimensional data analysis into link analysis. In so doing, we provide a formal basis for one particular form of automatic schema-ontology mapping from OLAP data cubes to semantic graphs databases, and point the way towards future ``intelligent'' OLAP data cubes equipped with meta-data about their dimensional typing.

  1. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  2. Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Useful Links BIOSYNC: Structural Biology Synchrotron Users Organization X-ray Anomalous Scattering Going MAD at CHESS Protein Data Bank International Union of Crystallography ...

  3. links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Useful Links Other Cyclotrons National Superconducting Cyclotron Laboratory at Michigan State Univeristy Indiana University Cyclotron Facility Cyclotron Research Centre at Louvain 88" Cyclotron at Lawrence Berkley National Lab Department of Energy National Labs Brookhaven National Laboratory Lawrence Berkeley National Laboratory Fermi National Accelerator Laboratory Los Alamos National Laboratory Sandia National Laboratories Ames Laboratory Pacific Northwest National Laboratory Oak Ridge

  4. The Office of Health, Safety and Security link to the VPPPA

    Energy.gov [DOE]

    Need to know which sites are current DOE-VPP or OSHA VPP Sites? The link, below, will take you to a Voluntary Protection Programs Participant's Association web page where you may search for current VPP sites by state.

  5. Security Policy

    Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  6. Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links: CAMD's SAXS beamline sister page By Derek Dorman General Reference: Glatter and Kratky Small Angle X-ray Scattering Book (subject to the permission letter and terms of use) SAXS Presentation by Jianhua Li SAXS Presentation by John Pople Dr. Brian Grady's Polymer Characterization Group SAXS page Jun, Y., Waychunas, G. "Molecular-Level Investigations of Nucleation Mechanisms and Kinetics of Formation of Environmental Nanoparticles" Poster SAXS Analysis/Simulation: Paul Scherrer

  7. EIA- Energy Efficiency Related Links: EIA Reports and Analyses

    Energy Information Administration (EIA) (indexed site)

    Reports Energy-Efficiency Related: EIA Reports and Analyses Released Release Date: October 1999 Last Updated: August 2010 End Users: Commercial Buildings Manufacturing ...

  8. Website Policies / Important Links | Geothermal

    Office of Scientific and Technical Information (OSTI)

    Website Policies Important Links Website Policies Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  9. Website Policies / Important Links | sciencecinema

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  10. Website Policies / Important Links | sciencecinema

    Office of Scientific and Technical Information (OSTI)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  11. Website Policies / Important Links | Geothermal

    Office of Scientific and Technical Information (OSTI)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  12. Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Related Sites National Nanotechnology Initiative Nano Technology Industries Advanced Materials Research Institute Institute of Physics Max-Planck Institute for Kohlenforschung The ...

  13. Community Relations Council | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Relations Council Community Relations Council We salute these dedicated individuals who have volunteered to facilitate greater information exchange between Y-12 and the East Tennessee region. These members are committed to voicing their unique perspectives for the mutual benefit of Y-12 and our East Tennessee neighbors. Steve Jones, Business Leader, Community Relations Council Chair Shirley Cox, Y-12 Retiree Community Relations Council Vice-Chair Mike Belbeck, Medical Community Dr. Bruce

  14. Freedom of Information Act Related Sites | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Related Sites DOE Headquarters FOIA Page DOE Office of Hearings and Appeals Searchable index of FOIA and Privacy Act appeals A Citizen's Guide on Using the Freedom of Information Act and the Privacy Act of 1974 to Request Government Records Department of Justice (DOJ) Office of Information and Privacy Includes the DOJ Guide to the FOIA, Overview of the PA, Your Right to Federal Records, FOIA Updates, and FOIA Annual Reports Defense Nuclear Facilities Safety Board An

  15. Related Links

    Energy.gov [DOE]

    The Advanced Manufacturing Office (AMO) aligns its activities with recommendations from the President and his advisors, while drawing insights from industrial experts and research institutions. Learn more about national priorities for manufacturing from these influential reports.

  16. Related Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    laser beams onto a fusion target about the size of a pencil eraser. NIF became operational in March 2009. NIF is the size of a sports stadium-three football fields could fit inside...

  17. Website Policies / Important Links | DOE Patents

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  18. Website Policies / Important Links | Data Explorer

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  19. Website Policies / Important Links | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    Website Policies Important Links Website Policies Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  20. Website Policies / Important Links | DOE PAGES

    Office of Scientific and Technical Information (OSTI)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  1. Website Policies / Important Links | Data Explorer

    Office of Scientific and Technical Information (OSTI)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  2. Website Policies / Important Links | DOE Patents

    Office of Scientific and Technical Information (OSTI)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  3. Global partnering related to nuclear materials safeguards and security - A pragmatic approach to international safeguards work

    SciTech Connect

    Stanford, Dennis

    2007-07-01

    This paper documents issues Nuclear Fuel Services, Inc. has addressed in the performance of international work to safeguards and security work. It begins with a description of the package we put together for a sample proposal for the Global Threat Reduction Initiative, for which we were ranked number one for technical approach and cost, and concludes with a discussion of approaches that we have taken to performing this work, including issues related to performing the work as part of a team. The primary focus is on communication, workforce, equipment, and coordination issues. Finally, the paper documents the rules that we use to assure the work is performed safely and successfully. (author)

  4. E-print Network Website Policies and Important Links -- Energy...

    Office of Scientific and Technical Information (OSTI)

    Website Policies Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  5. SciTech Connect: Website Policies / Important Links

    Office of Scientific and Technical Information (OSTI)

    Website Policies Important Links Website Policies Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  6. SciTech Connect: Website Policies / Important Links

    Office of Scientific and Technical Information (OSTI)

    Website Policies / Important Links Website Policies / Important Links Javascript Not Enabled OSTI Security Website Policies and Important Links

  7. DOE Integrated Security System (DISS) preliminary communication security analysis

    SciTech Connect

    Sweeney, D. J.

    1993-10-01

    The purpose of this analysis is to document a technical approach to improve DOE Integrated Security System (DISS) dial-up communications security and the requirements to address them. This document is not intended as a comprehensive analysis of the security aspects of the DISS computer system but rather as an analysis of the dial-up communications security as it pertains to the use of the DISS database in the new DOE Automated Visitors Access Control System (DAVACS) procedures. Current access controls into the DISS will be discussed with emphasis on the DAVACS procedures. Recommendations will be provided for increasing the dial-up communications security into DISS as it relates to the automated visit procedures. Finally a design for an encrypted dial-up communication link to DISS will be given.

  8. External Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    External Links External Links This page contains links to web sites and pages having to do with the Federal Energy Technology Network, Department of Energy, and Energy related Internet resources. The information is divided into the following categories: Table of Contents Department of Energy Support Offices Within the Department of Energy Office of Small & Disadvantaged Business Utilization (OSDBU) General Information Sources about Government Non-Government Energy and Environmental Related

  9. Y-12 Administration and Labor Relations building | Y-12 National Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Complex Administration and ... Y-12 Administration and Labor Relations building Employees leave the Y-12 Administration and Labor Relations building. Has anything changed much?

  10. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  11. International Nuclear Security | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    world-wide to improve the security of proliferation-sensitive materials, particularly ... Related Topics nopnproliferation R&D proliferation detection Related News Radiological ...

  12. Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models

    SciTech Connect

    Droppo, James G.

    2006-07-01

    The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and

  13. WIPP - Related Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Safety Council - Understanding Radiation NM Governor NMSU - Carlsbad Quality New Mexico TCC Support Website WERC Western Governor's Association Yucca Mountain Project

  14. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security

  15. Security of databases

    SciTech Connect

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  16. National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  17. Link Alpha S

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Access Managers (SAM) Security and Emergency Operations SECURITY CALL x4050 Security Operations Security: Clearance Holders Security: Information and Property Protection ...

  18. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  19. Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energy's corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that

  20. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  1. Security Officer

    Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  2. National Security and Cyber Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  3. Presidential Initiatives | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    ... Proliferation Security Initiative: For more information, click here off site link . ... called for closing the Nuclear Non-Proliferation Treaty "loophole" by restricting the ...

  4. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  5. Safety, Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  6. Security Perimeter

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  7. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear

  8. Energy Citations Database (ECD) - Security/Disclaimer

    Office of Scientific and Technical Information (OSTI)

    Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take you to non-federal websites. Their policies may differ from this site....

  9. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  10. Links (pbl/contracts)

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Implementation Links to related sites Regional Dialogue Transmission Regional Dialogue issues Team ASC Methodology 2012 BPA Rate Case Page content last modified on: April 06, 2010...

  11. Demo Links | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure ...

  12. Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  13. HELPFUL LINKS

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Helpful Links HELPFUL LINKS Caution: Many of the links listed below are outside of the DOE Idaho Operations Office, (DOE-ID) Internet site and are not under our control. They have been provided as a convenience to you. DOE-ID is not responsible for the content of linked sites or any link contained in those sites. It is up to the individual user to protect themselves and to take adequate precaution against possible damages resulting from linked sites. Science.gov Communications Page Defense

  14. Cool Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Cool Links Cool Links Can't get enough science? Click on these links to learn more about science and innovations at the Lab and beyond! Science and learning activities Los Alamos National Laboratory links Bradbury Science Museum video The Town That Never Was Bradbury Science Museum video Heritage of Science (Stockpile Stewardship) Los Alamos National Laboratory Homepage A list of Los Alamos National Laboratory publications Los Alamos National Laboratory's periodic table website Los Alamos

  15. Cyber Security Evaluation Tool

    SciTech Connect

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  16. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  17. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  18. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  19. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  20. Safeguards and Security Program References

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  1. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  2. Global security

    SciTech Connect

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  3. Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  4. Global security

    ScienceCinema

    Lynch, Patrick

    2016-07-12

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  6. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and ...

  7. Security Specialist

    Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  8. Infrastructure Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  9. ARM - Quick Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links Related Links ISDAC Home AAF Home AVP Aircraft Instrumentation, October 14-16, 2008 ARM Data Discovery Browse Data Post-Campaign Data Sets Flight Summary Table (PDF, 440K) ISDAC Wiki Mission Summary Journal Deployment Resources NSA Site ARM Data Plots Quick Links Experiment Planning ISDAC Proposal Abstract Full Proposal (pdf, 1,735K) Science Questions Science Overview Document for ISDAC (pdf, 525K) ISDAC Flight Planning Document (PDF, 216K) Collaborations Logistics Measurements &

  10. Links - SRSCRO

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links Links Links Surplus Equipment Bolin Marketing Group | www.bmgsurplus.com Counties of the SRSCRO Region Aiken County | www.aikencounty.net Allendale County | www.allendalecounty.com Barnwell County | www.barnwellcounty.sc.gov Columbia County | www.columbiacountyga.gov Richmond County | www.augustaga.gov Chambers of Commerce Aiken SC | www.aikenchamber.net Augusta, GA | www.augustagausa.com Barnwell, SC | www.barnwellcountychamber.org Columbia County, GA | www.columbiacountychamber.com North

  11. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    to administrative review citing as security concerns the individual's diagnosis of alcohol abuse and his alcohol-related arrests. After conducting a hearing, convened at the...

  12. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  13. American press coverage of US-Soviet relations, the Soviet Union, nuclear weapons, arms control, and national security: A bibliography

    SciTech Connect

    Dorman, W.A.; Manoff, R.K.; Weeks, J.

    1988-01-01

    This bibliography covers work that addresses coverage of nuclear and arms control issues, defense, the Soviet Union, and Soviet-American relations by the American news media between 1965 and 1988. Material selected for inclusion either discusses press performance or addresses conditions -- such as classification of information -- that directly impact on media coverage of such issues. Bodies of literature on media coverage of conflict elsewhere in the world lie outside the Center's current mandate (which has shaped the parameters of this bibliography) except insofar as such conflicts are presented by the news media specifically in the context of US-Soviet relations. Much the same is true of such issues as the North-South flow of information and the debate over calls for a New World Information Order. However, the authors have decided to include assessments of American media coverage of the Vietnam War as a case study of a watershed conflict that raised many of the issues discussed throughout this literature in a particularly compelling way.

  14. Related Links | Department of Energy

    Office of Environmental Management (EM)

    ... Waste Services Association National Association of Wheat Growers (NAWG) National Biodiesel Board National Corn Growers Association (NCGA) Pellet Fuels Institute Renewable Fuels ...

  15. Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    The Case for a National Manufacturing Strategy, The Information Technology and Innovation Foundation, April 2011. Legislative and Executive Guidance P.L. 109-58, "Energy Policy Act ...

  16. Related Links | Department of Energy

    Energy Saver

    Beyond this page, learn more about BETO's Algae Program R&D by visiting the Information ... Final Report BETO Multi-Year Program Plan July 2014 Exploring the Utilization of ...

  17. EIA - Related Links for Transportation

    Energy Information Administration (EIA) (indexed site)

    information about American society, political processes, official U.S. policies and culture. U.S. Department of the Treasury IRS and Treasury Provide Guidance to Hybrid...

  18. Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Information about marine and hydrokinetic resources, government activities and research, water power associations and organizations, learning activities, and homeowner resources ...

  19. Beryllium Related Links - Hanford Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Group (BAG) Website 10CFR850 Final Rule Preamble (PDF) OSHA NIOSH National Jewish Hospital, Denver; Beryllium Program University of Pennsylvania Hospital, Philadelphia DOE...

  20. Advanced Diagnostics and Life Estimation of Extruded Dielectric Cable: Nonproprietary Results Related to Cross-Linked Polyethylene and Ethylene Propylene Rubber Insulated Shielded Cables

    SciTech Connect

    G. Toman

    2006-03-31

    This report describes research on accelerated aging and diagnostic testing of cross-linked polyethylene (XLPE) insulation and an earlier test program on ethylene propylene rubber (EPR) cables. The XLPE research subjected cable specimens to accelerated cable life tests (ACLTs) and assessed the specimens with six nondestructive electrical tests and two destructive tests. The EPR program subjected EPR insulation to a similar accelerated aging protocol but focused on breakdown voltage to assess aging. Objectives ? To correlate advanced diagnostic test data with time-to-failure data as a means of determining the value of each diagnostic test for cable condition assessment and future life predictions (XLPE program) ? To perform accelerated aging tests of EPR insulated cables under various controlled conditions of temperature and voltage stress in a wet environment (EPR program) ? To ascertain the relative influence of temperature and voltage stress on aging (EPR program)

  1. ssp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ssp Meet a Machine: Sandia Labs' Thor doesn't need a hammer to support national security Thor's aim is to study materials at extreme pressures, which helps NNSA ensure a safe, secure, effective nuclear deterrent. Thor is different from previous pulsed-power accelerators, which are comprised of a few massive components, because it instead uses many small capacitors linked... Groundbreaking Leader of Computation at LLNL Retires Dona Crawford, Associate Director for Computation at NNSA's Lawrence

  2. Nuclear Security Enterprise | National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  3. Security Conditions

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  4. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Computer Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  6. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Security Specialist

    Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  8. Security Rulemaking

    Office of Environmental Management (EM)

    Program (WP) | Department of Energy Securing Clean, Domestic, Affordable Energy with Wind (Fact Sheet), Wind Program (WP) Securing Clean, Domestic, Affordable Energy with Wind (Fact Sheet), Wind Program (WP) This fact sheet provides a brief description of the Wind Energy Market and describes the U.S. Department of Energy's Wind Program research and development efforts. eere_wind_water.pdf (499.36 KB) More Documents & Publications Offshore Wind Projects Wind Program Accomplishments Wind

  9. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  11. Requirements for security signalling

    SciTech Connect

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  12. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had right-sized the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community or it may lie in more effectively using our existing resources and training programs.

  13. Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  14. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  15. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) About / Our Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory

  16. Safeguards & Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Safeguards & Security Sandia Field Office's Safeguards and Security (S&S) office is responsible for providing oversight and contract administration for all Sandia National Laboratories activities related to S&S. S&S provides oversight to ensure the effective implementation of the overall S&S program at Sandia National Laboratories to include the following: program management, protection program operations, nuclear material control and accountability, information security and

  17. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  18. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  19. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  20. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  1. Defense Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Programs Defense Nuclear Security The Office of Defense Nuclear Security develops and implements NNSA security programs to protect, control, and account for materials, information, and facilities across the nuclear security enterprise. The Office of the Chief, Defense Nuclear Security (CDNS) executes responsibility for the overall direction and management of security programs employed across the nuclear security enterprise comprised of NNSA's operations and facilities. The CDNS is

  2. Nonproliferation Policy | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation Policy Challenge: Address evolving threats/challenges to the nonproliferation and arms control regimes. Solution: Develop programs and strategies to address emerging nonproliferation and arms control challenges and opportunities. Learn More 10 CFR Part 810 Related Topics international security international security policy NIS nuclear controls safeguards safeguards and security verification Related News Nuclear Verification International Nuclear Safeguards Nonproliferation and

  3. Nuclear Controls | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Control Nuclear Controls Challenge: Detect/deter illicit transfers of nuclear/dual-use materials, technology, and commodities. Solution: Build domestic and international capacity to implement and meet export control obligations. Related Topics international security international security policy NIS nuclear controls safeguards safeguards and security verification Related News Nuclear Verification International Nuclear Safeguards Nonproliferation Policy Nonproliferation and Arms Control NIS

  4. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  5. Security Conditions

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  6. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  7. MIDC: Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links Other Data Collection Activities Baseline Surface Radiation Network (BSRN) Clear Sky Forcast for NREL/SRRL (or other locations) Colorado Dept. of Public Health & Environment: Air Quality Index (AQI) Reporting System Colorado State University: USDA UV-B Monitoring and Research Program European Skynet Radiometers network (ESR) Jefferson County, Colorado: Jeffco Weather Station NOAA: Climate Monitoring & Diagnostics Laboratory (CMDL) NREL OTF: Reference Meteorological and Irradiance

  8. Energy Security Council

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  9. ENERGY SUPPLY SECURITY 2014

    Energy.gov [DOE] (indexed site)

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  10. Nuclear security

    SciTech Connect

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  11. Computer Security Risk Assessment

    Energy Science and Technology Software Center

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  12. Tag: Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Tag: Security Displaying 1 - 7 of 7... Category: Security Integrating Safeguards, Security, & Emergency Services at CNS Lindy Pyatt, Y-12 S&S Performance Assurance Issues Management, assists Gannon Tucker, the CNS SS&ES change control administrator based at Pantex, with consolidating security's document control. More... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these instructions. More...

  13. Information Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  14. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  16. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  17. Global Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    sector. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  18. Secure authenticated video equipment

    SciTech Connect

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  19. Personnel Security

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  20. Radiological Security Program | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  1. V-008: Debian Security Advisory | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    08: Debian Security Advisory V-008: Debian Security Advisory October 23, 2012 - 6:00am Addthis PROBLEM: Debian Security Advisory PLATFORM: Debian GNU/Linux 6.0 ABSTRACT: Debian update for bind9 REFERENCE LINKS: Debian Security Advisory DSA-2560-1 Debian bugtracking system: Bug 690118 ISC Reference Number: AA-00801 Secunia Advisory SA51054 CVE-2012-5166 IMPACT ASSESSMENT: Medium DISCUSSION: was discovered that BIND, a DNS server, hangs while constructing the additional section of a DNS reply,

  2. Security Notice | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  3. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  4. INL Cyber Security Research (2008) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms and other viruses. INL Cyber Security Research (2008) (1.06 MB) More Documents & Publications Mitigations for Security Vulnerabilities Found in Control System Networks Introduction SCADA Security for Managers and Operators The NIAC Convergence of Physical and Cyber Technbologies and Related Security Management

  5. NERSC Computer Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  6. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  7. Framework for SCADA Security Policy (October 2005)

    Office of Energy Efficiency and Renewable Energy (EERE)

    Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate...

  8. About Us | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    sector to secure, safeguard, andor dispose of dangerous nuclear and radiological material, and detect and control the proliferation of related WMD technology and expertise. ...

  9. Safeguards and Security Program, acronyms and abbereviations...

    Office of Environmental Management (EM)

    More Documents & Publications Safeguards and Security Glossary - DOE M 470.4-7 References, Canceled -7 Section B - April 16 2010 Briefing, Classification of Nuclear Weapons-Related ...

  10. Kansas City National Security Campus | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Kansas City National Security Campus The NNSA's Kansas City National Security Campus, located near Kansas City, MO, is responsible for manufacturing and procuring nonnuclear components for nuclear weapons, including electronic, mechanical, and engineered material components. It supports national laboratories, universities, and U.S. industry. The KCNSC is operated by Honeywell Federal Manufacturing & Technologies. Visit our website Related News Kansas City National

  11. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  12. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  13. Incidents of Security Concern

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION ... Security; Office of Security Policy, GTNHS-51; 1000 Independence Ave., SW; Washington, DC ...

  14. Tag: security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    security Tag: security Displaying 1 - 10 of 13... Category: Employees & Retirees Tactical Response Force 1 graduation: a family reunion of sorts Family ties makes a fitting theme for Tactical Response Force 1 Class 3-16's graduation ceremony. More... Category: News Y-12 National Security Complex reopened Officials at the Y-12 National Security Complex have reopened the plant to employees following the early morning closure of Y-12 because of a law enforcement situation. More... Category:

  15. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nuclear security Meet a Machine: RPMs keep watch 24/7 to strengthen global nuclear security Ensuring that nuclear materials are not being illicitly moved is part of NNSA's core mission to reduce nuclear and radiological threats. However, since traditional security tools - such as metal detectors, X-ray scanners, and sniffer dogs - cannot measure radiation, frontline... U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA

  16. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where high-priority

  17. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    national security campus Kansas City National Security Campus volunteers help students with FIRST Robotics The FIRST Robotics competition in Kansas City, March 10-12, resembled a medieval battlefield as nearly 50 high school teams battled robot against robot to scale the opponent's defenses and capture their tower and flag. For the past 10 years, Kansas City National Security Campus employees have... Kansas City National Security Campus contractor and University of Kansas to collaborate on NNSA

  18. Secure Storage Architectures

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  19. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Nuclear Data Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links to Other Useful Sites Online Journals Institutions and Programs Related to Nuclear Physics U.S. Nuclear Data Program: All evaluated nuclear data supported by the U.S. Department of Energy. National Nuclear Data Center: Brookhaven National Laboratory; Evaluated Nuclear Structure Data Files (ENSDF), Nuclear Science References (NSR) and other databases. Isotopes Project: (E.O.L. Berkeley National Laboratory) Table of Isotopes, Isotope Explorer, XUNDL, Nuclear Data Dissemination Homepage, and

  1. Advancing Global Nuclear Security

    Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  2. Information Technology Specialist (Security)

    Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  3. Personnel Security Specialist

    Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  8. BROADER National Security Missions

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  9. Personnel Security Activities

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  10. Office of Security Assessments

    Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  11. National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  12. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    ) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  13. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  14. Climate-derived tensions in Arctic security.

    SciTech Connect

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  15. Environmental Program Services Contract | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Management Environmental Program Services Contract Environmental Program Services Contract Learn More Environmental Program Services Contract Related Topics apm contracting contracts Related News NNSA Office of Acquisition Management improves customer satisfaction NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Los Alamos National

  16. Secure communications using quantum cryptography

    SciTech Connect

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  17. Personnel Security Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  18. Personnel Security Program Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  19. Office of Security Assistance

    Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  20. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  1. AP1000 Design for Security

    SciTech Connect

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-07-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  2. Energy Independence and Security Act of 2007 | Open Energy Information

    OpenEI (Open Energy Information) [EERE & EIA]

    Energy Independence and Security Act of 2007 Jump to: navigation, search This article is a stub. You can help OpenEI by expanding it. External Links Energy Independence and...

  3. Enforcement Letter, Los Alamos National Security, LLC | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Energy Los Alamos National Security, LLC Enforcement Letter, Los Alamos National Security, LLC September 18, 2015 Security Enforcement Letter issued to Los Alamos National Security, LLC On September 18, 2015, the U.S. Department of Energy (DOE) Office of Enterprise Assessments' Office of Enforcement issued an Enforcement Letter (SEL-2015-02) to Los Alamos National Security, LLC relating to the unauthorized disclosure of classified information at the Los Alamos National Laboratory.

  4. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  5. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  6. Nuclear Security Enterprise | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the application of science, technology, engineering, (ST&E) and manufacturing. In the next 20 years, the U.S. nuclear weapons stockpile will be sustained and modernized through vigorous surveillance, assessment, life extension and dismantlement efforts. In addition, progress will be made in modernizing the physical

  7. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Summit Team members receive DOE Secretary Awards for nuclear security efforts This month NNSA team members received honors as part of the Secretary's Awards Program. The program, designed to recognize service and contributions of Department of Energy (DOE) employees to mission in benefit of the Nation, is comprised of several award types. The Secretary's Honor... U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future

  8. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  9. Personnel Security Program | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    several key program areas including Defense, Nuclear Nonproliferation, Naval ... & Classification (OPFCC) is part of the NNSA, Office of Defense Nuclear Security. ...

  10. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. ...

  11. Secure Storage | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  12. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  13. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  14. Related Publications

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Skip navigation links Financial Information Financial Public Processes Asset Management Cost Verification Process Rate Cases BP-18 Rate Case Related Publications Meetings...

  15. Energy Efficiency Links

    Energy Information Administration (EIA) (indexed site)

    Energy Efficiency Organizations Energy Efficiency Organizations Release Date: October 1999 Last Updated: Septembert 2009 EIA Links Disclaimer: These pages contain hypertext links...

  16. Climate change and energy security: an analysis of policy research

    SciTech Connect

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The literature on climate change's impacts on energy security is scattered across disparate fields of research and schools of thought. Much of this literature has been produced outside of the academy by scholars and practitioners working in "think tanks," government agencies, and international/multilateral institutions. Here we reviewed a selected set of 58 articles and reports primarily from such sources and performed textual analysis of the arguments. Our review of this literature identifies three potential mechanisms for linking climate change and energy security: Climate change may 1) create second-order effects that may exacerbate social instability and disrupt energy systems; 2) directly impact energy supply and/or systems or 3) influence energy security through the effects of climate-related policies. We identify emerging risks to energy security driven by climate mitigation tech-nology choices but find less evidence of climate change's direct physical impacts. We used both empirical and qualitative selection factors for choosing the grey literature sample. The sources we selected were published in the last 5 years, available through electronic media and were written in language accessible to general policy or academic readers. The organi-zations that published the literature had performed previous research in the general fields of energy and/or climate change with some analytical content and identified themselves as non-partisan. This literature is particularly valuable to scholars because identifies understudied relationships that can be rigorously assessed through academic tools and methodologies and informs a translational research agenda that will allow scholars to engage with practitioners to address challenges that lie at the nexus of climate change and energy security.

  17. Preliminary Notice of Violation, National Security Technologies, LLC- NEA-2011-03

    Energy.gov [DOE]

    Issued to National Security Technologies, LLC related to Deficiencies in Inspection and Installation of Penetration Fire Seals and Other Components at the Nevada National Security Site

  18. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  19. Security - DOE Directives, Delegations, and Requirements

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security by Website Administrator Back

  20. Kansas City National Security Campus contractor and University...

    National Nuclear Security Administration (NNSA)

    Related Topics kcnsc missouri national security campus nsc research STEM Related News NNSA-lab-created new magnets will power renewable technology Nuclear weapons research holds ...

  1. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    port security NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy Administrator for Defense Nuclear Nonproliferation (DNN), David Huizenga, participated in a ceremony commemorating the transition of a radiation detection system at the Port of Yangshan to the General

  2. Los Alamos lab director to link science education, national security...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    on how non-scientists can inspire young people to STEM careers and scientific literacy. ... on how non-scientists can inspire young people to STEM careers and scientific literacy. ...

  3. BSL-3 Links | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    LANL Institutional Biosafety Committee (IBC) Homepage National Institutes of Health U.S. DOE NEPA web U.S. Department of Energy National Institute of Allergy and Infectious ...

  4. Center of Excellence | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Center of Excellence NNSA Deputy Administrator Creedon Travels to China In March, National Nuclear Security Administration (NNSA) Principal Deputy Administrator Madelyn Creedon traveled to China to participate in activities related to NNSA's cooperative engagement with various Chinese ministries on nuclear security. Creedon was accompanied by Principal Assistant

  5. Nevada National Security Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  6. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  8. Office of Information Security

    Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  9. Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  10. Global Security 2009

    Office of Environmental Management (EM)

    ... Management *Data Loss Prevention *Audit ability *OI & CS Technology Platforms *Big Data *Analytics *Monitoring *Cyber Security *Intelligence *Hyper Innovation Global ...

  11. Personnel Security Program Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  12. Security Risk Assessment

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  13. National Security Science Archive

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    NSS Archive National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Archive National Security Science magazine showcases the importance, breadth, and depth of the Laboratory's scientific and technical work that is used to solve key challenges to U.S. national security. NSS April 2016 April 2016 viewer | web | print NSS July 2014 July 2015 viewer | web | print NSS July 2014 December 2014 viewer | web | print NSS July 2014 July 2014 viewer | web

  14. Lab announces security changes

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  15. Electronic security device

    DOEpatents

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  16. Electronic security device

    DOEpatents

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  17. Headquarters Facilities Master Security Plan - Chapter 10, Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Awareness Program | Department of Energy 0, Security Awareness Program Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program 2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program This chapter covers all the security awareness briefings conducted at HQ. The following security briefings are required for all HQ Federal employees and contractors: an Initial Security Briefing, which is given when a new employee starts work; the

  18. Secure Control Systems for the Energy Sector

    SciTech Connect

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  19. Tag: global security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    global security Tag: global security Displaying 1 - 10 of 23... Category: Global Security Additive Manufacturing Y-12's machining expertise complements our ability to produce additive manufacturing tooling and components. More... Category: Global Security Technologies and Research Capabilities We're furthering research and development of additive manufacturing in national security applications. More... Category: Global Security Alarm Response Training Academy celebrates an anniversary Alarm

  20. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  1. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  2. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  3. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  4. Alternative Fuels Data Center: Related Links

    Alternative Fuels and Advanced Vehicles Data Center

    Fuel Provider Heavy-Duty Vehicles Hybrid Electric Vehicles Hydrogen Idle Reduction Law Enforcement Long-Haul Trucking Methanol Natural Gas Natural Gas Vehicles Plug-in Hybrid ...

  5. Program Evaluation: Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    University Evaluation Resource Centers Institute for Social Research, University of Michigan International Institute for Qualitative Methodology, University of Alberta National ...

  6. Biochemical Conversion Related Links | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Conversion 2009 Peer Review Biochemical Production of Ethanol from Corn Stover: 2007 State of Technology Model For more publications, see the Bioenergy Publication Library

  7. Alternative Fuels Data Center: Biodiesel Related Links

    Alternative Fuels and Advanced Vehicles Data Center

    ... EPA is the federal agency charged with protecting human health and safeguarding the natural environment-air, water, and land-on which the well-being of the nation depends. ...

  8. Sandia Energy - Installation Energy Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  9. Enforcement Letter, National Security Technologies, LLC - November...

    Energy.gov [DOE] (indexed site)

    7 Issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site On November 13, 2007, the U.S....

  10. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  11. Helpful Links - Hanford Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Helpful Links Helpful Links Helpful Links Hanford Staff Directory Hanford Site Wide Programs Energy Employees Occupational Illness Compensation Hanford Workers Compensation Projects & Facilities HERO PHOENIX Hanford Meteorological Station Definitions Abbreviations and Acronyms Visitor Control and Site Access Visitor Hanford Computer Access Request Helpful Links Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size Contact Us Do you have a question? Contact Hanford

  12. Lessons Learned from Cyber Security Assessments of SCADA and Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Management Systems | Department of Energy Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common problem areas. In each vulnerability category, relative measures were assigned to the severity. Lessons Learned from Cyber Security

  13. Compliance Order, Los Alamos National Security, LLC - July 12, 2007 |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy Compliance Order, Los Alamos National Security, LLC - July 12, 2007 Compliance Order, Los Alamos National Security, LLC - July 12, 2007 July 12, 2007 Issued to Los Alamos National Security, LLC related to the Unauthorized Reproduction and Removal of Classified Matter from the Los Alamos National Laboratory On July 12, 2007, the Secretary of Energy issued a Compliance Order to Los Alamos National Security, LLC requiring the contractor to implement specific corrective

  14. Headquarters Facilities Master Security Plan - Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy , Physical Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security 2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security This chapter covers the procedures adopted by HQ to implement directives governing the physical protection of U.S security interests. These procedures include control of employee and visitor access to HQ buildings, detection and control of dangerous devices, issuance of security badges to HQ

  15. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  16. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES [OSTI]

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore »and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  17. Beyond a series of security nets: Applying STAMP & STPA to port security

    SciTech Connect

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.

  18. Beyond a series of security nets: Applying STAMP & STPA to port security

    DOE PAGES [OSTI]

    Williams, Adam D.

    2015-11-17

    Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less

  19. National Security, Weapons Science

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Safety National Security & Safety In the video above, three veterans discuss how the skills they learned in the service are helping them advance energy security and grow the clean energy economy. The veterans shared their experiences at a Champions of Change event at the White House. | Video by Matty Greene, Energy Department. The Energy Department plays an important and multifaceted role in protecting national security. In addition to our work to increase nuclear nonproliferation and ensure

  20. Security | Argonne National Laboratory

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  1. Energy Security/Resiliency

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security/Resiliency Energy Security is "having assured access to reliable supplies of energy and the ability to protect and deliver sufficient energy to meet mission essential requirements" - FY2012, National Defense Authorization Act (NDAA) Resiliency is "the ability to anticipate, prepare for, and adapt to changing conditions and withstand, respond to, and recover rapidly from disruptions" - E.O. 13653 Key elements of Energy Security/Resiliency Planning Energy

  2. National Security Science

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Science National Security Science Latest Issue:April 2016 past issues All Issues » submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear weapons and in science for national and global security April 2016 july 2015 The Hurt-Locker School Explosive Results Questing for the Holy Grail of High Explosives Learning from (Near) Disaster A Safer Liftoff Shake, Rattle, and Roll Manhattan Project National Historical Park Strategic Deterrent Forces Charting a

  3. SecuritySmart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  4. Sandia Energy - Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  5. Oil Security Metrics Model

    SciTech Connect

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  6. Cyber and Physical Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering ...

  7. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  8. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  9. Supervisory Industrial Security Specialist

    Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  10. Sandia Energy - Water Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  11. Cyber Security Architecture Guidelines

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  12. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  13. Provision of mobile and man-portable radiation detection equipment;
  14. Regional cooperation on safeguards...

  15. National Security Education Center

    SciTech Connect

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  16. Supervisory Security Specialist

    Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  17. Security | Department of Energy

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... that establishes the policies and procedures for a Human Reliability Program (HRP) in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). ...

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  19. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  21. Security Administration Production Office,

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  22. AlumniLink: November 2014

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    can potentially fight infectious diseases and genetic disorders Secure computing for the "Everyman" Quantum key distribution technology could ensure truly secure commerce, banking, ...

  1. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  2. Contact Us | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Contact Us Contact the NNSA Los Alamos Field Office NNSA Los Alamos Field Office (NA-00-LA) 3747 West Jemez Road Los Alamos, NM 87544 (505) 667-6691 Please send any comments, questions, or feedback to Toni Chiri Featured Links LANL Phonebook Los Alamos National Laboratory Los Alamos County USA Gov Department of Energy (DOE) New Mexico Environmental Department - LANL U.S. Department of Homeland Security

  3. Lawrence Livermore National Laboratory | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Lawrence Livermore National Laboratory Lawrence Livermore National Laboratory DE-AC52-07NA27344 Operated by Lawrence Livermore National Security, LLC BASIC Contract (Official) Modifications (Official) Funding Mods Available Upon Request Conformed Contract (Unofficial) LLNL Sec A (SF33) (pdf, 91KB) See Modifications Section under Conformed Contract Link LLNS Conformed Contract (weblink) LLNL Sec B-H (pdf, 306KB) LLNL Sec I pdf 687KB LLNL Sec J Appx A (pdf, 67KB) LLNL

  4. Fact Sheet: The United States and Caspian Energy Security | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    The U.S. government encourages Caspian countries to increase regional cooperation to ... Related Articles Fact Sheet: U.S-Turkey Cooperation in Global Energy Security Acting ...

  5. National Nuclear Security Administration Kansas City Field Office

    National Nuclear Security Administration (NNSA)

    Department of Energy National Nuclear Security Administration Kansas City Field Office 14520 Botts Road Kansas City, Missouri 64147 Kansas City Plant Related Web Pages Kansas City ...

  6. Enforcement Letter, Los Alamos National Security, LLC - May 15...

    Energy.gov [DOE] (indexed site)

    Issued to Los Alamos National Security, LLC related to the Protection of Classified ... about the protection of classified information at the Los Alamos National Laboratory. ...

  7. Final Notice of Violation, Los Alamos National Security, LLC...

    Office of Environmental Management (EM)

    LLC for violations of the Department of Energy's classified information security requirements relating to a loss of classified matter at the Los Alamos National Laboratory. ...

  8. Enforcement Letter, National Security Technologies, LLC- November 13, 2007

    Energy.gov [DOE]

    Issued to National Security Technologies, LLC related to an Unplanned Radiological Exposure during a Borehole Activity at the Nevada Test Site

  9. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  10. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  11. Information Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  12. CIOs Uncensored: Security Smarts.

    SciTech Connect

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  13. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  14. Water Security Toolkit

    Energy Science and Technology Software Center

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  15. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  16. Information Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  17. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  18. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  19. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  20. Intelligent mobile security systems

    SciTech Connect

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  1. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  2. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. AlumniLink

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    AlumniLink Alumni Link: Opportunities, News and Resources for Former Employees Latest Issue:September 2015 all issues All Issues » submit AlumniLink Bi-monthly publication connecting our alumni with news, information and former colleagues from the Lab. Alumni September 2015 September 2015 Neutrons find "missing" magnetism of plutonium Young, Jupiter-like planet discovered Four Los Alamos projects selected as R&D 100 Award finalists SHARE Alumni July 2015 July 2015 Mars Rover's

  4. Nuclear Data Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links to Useful Online Nuclear Physics Journals Important Online Resources Science Direct ... Elsevier Physics Online: Nuclear Physics A, B, Physics Repots, Physics Letters B and more. ...

  5. EIA Energy Efficiency-Energy Related Greenhouse Gas Emissions...

    Energy Information Administration (EIA) (indexed site)

    Related Greenhouse Gas Emissions Links Energy Related Greenhouse Gas Emissions Links Posted Date: May 2007 Page Last Modified: September 2010 EIA Links Disclaimer: These pages...

  6. National Security Technology Center | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Global Security / Security and Training / National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities section, which includes a printable fact sheet, for more about what we can do and how we can accomplish it. For specific examples of security devices currently in development or already deployed, explore the new technologies section. Several of our innovative technologies have received recent media coverage focusing on

  7. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  8. Preliminary Notice of Violation, Los Alamos National Security...

    Office of Environmental Management (EM)

    Issued to Los Alamos National Security, LLC, related to Four Electrical Safety-Related ... of 10 C.F.R. 851 associated with four electrical safety-related events that occurred ...

  9. Special Report Order, Los Alamos National Security, LLC - January 4, 2008 |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy Los Alamos National Security, LLC - January 4, 2008 Special Report Order, Los Alamos National Security, LLC - January 4, 2008 January 4, 2008 Issued to Los Alamos National Security, LLC related to Glovebox Activities at TA-55 and Chemistry and Metallurgy Research Facilities at the Los Alamos National Laboratory On January 4, 2008, the National Nuclear Security Administration issued a Special Report Order to Los Alamos National Security, LLC relating to potential

  10. Tag: Global Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  11. Office of Radiological Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  12. Y-12 National Security Campus | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  13. Safeguards and Security and Cyber Security RM | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Safeguards and Security and Cyber Security RM Safeguards and Security and Cyber Security RM The SSCS RM is a tool that assists the DOE federal project review teams in evaluating the technical sufficiency of the project SSCS activities at CD-0 through CD-4. Safeguards and Security and Cyber Security RM (2.31 MB) More Documents & Publications Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Glossary - DOE M 470.4-7 Standard Review Plan -

  14. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Saver

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  15. Los Alamos physicist Hockaday honored for national security contributions

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Los Alamos physicist Hockaday honored for national security contributions Alumni Link: Opportunities, News and Resources for Former Employees Latest Issue:September 2015 all issues All Issues » submit Los Alamos physicist Hockaday honored for national security contributions Hockaday earned a 2014 fellowship from the AAAS and also a Distinguished Alumni Award from the NMSU Alumni Association January 1, 2015 Mary Hockaday Mary Hockaday Contact Linda Anderman Email Associate Director for

  16. Homeland Security | U.S. DOE Office of Science (SC)

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees Community Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: Email

  17. National Nuclear Security Administration Supplemental Listing of Directives

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Supplemental Listing of Directives Affecting Nuclear Safety Requirements Last Updated 06/2014 U.S. DEPARTMENT OF ENERGY National Nuclear Security Administration Office of the Chief of Defense Nuclear Safety AVAILABLE ONLINE AT: http://hq.na.gov link to NNSA Policies/Supplemental Directives Updated 6/10/14 This Page Intentionally Blank. Concurrence on Exemptions or Exceptions Page 1 ADDITIONAL DIRECTIVES (LATEST VERSION) REQUIRING CENTRAL TECHNICAL

  18. Toward more testable security equipment

    SciTech Connect

    Spencer, D.D.; Murray, D.W. )

    1991-01-01

    An important functional aspect of most security related equipment is the need for periodic performance testing. Sensors, entry-control devices, and other such security equipment usually have some sort or reliability or testing requirements. Unfortunately, testing requirements are seldom considered during equipment design, and testing becomes a prohibitively expensive or inconvenient afterthought. In this paper work at Sandia National Laboratories to address this concern is presented, focusing on metal detectors as a test case. Field testing of metal detectors is usually done by passing a test object through the opening to see whether an alarm is generated or not. Such alarm/no-alarm data are poor for making reliability estimates, and thus, a large quantity of such data is required to make good reliability statements. The detector itself uses much better internal information. Experiments tapping into some of this internal data will be discussed, and conclusions will be drawn about the possibility of redesign of metal detectors for enhanced testability. Such conclusions have implications for other types of security-related devices, as well.

  19. Departmental Cyber Security Management Policy

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  20. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  1. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  2. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  3. Security Enforcement Documents | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Enforcement Documents Security Enforcement Documents Documents Available for Download September 8, 2016 Enforcement Letter, Sandia Corporation Security Enforcement Letter issued to Sandia Corporation regarding two classified information security incidents September 23, 2015 Enforcement Letter, Los Alamos National Security, LLC Security Enforcement Letter issued to Los Alamos National Security, LLC July 31, 2015 Final Notice of Violation, Los Alamos National Security, LLC Security

  4. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  5. Voluntary Protection Program Onsite Review, National Security...

    Energy.gov [DOE] (indexed site)

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  6. PIA - Richland Personal Security Clearance Record | Department...

    Energy Saver

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  7. PRIVACY/SECURITY NOTICE

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  8. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  9. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  10. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  11. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  12. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  13. Smart-Grid Security Issues

    SciTech Connect

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  14. About SRNL - Directorates - National Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  15. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  16. Accomplishments | National Nuclear Security Administration |...

    National Nuclear Security Administration (NNSA)

    ... In FY 2009, ASC released improved codes to support stockpile stewardship and other nuclear security missions, including secure transportation, NSE infrastructure, and nuclear ...

  17. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  18. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  19. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  20. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  1. Los Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  2. Comparison of Routable Control System Security Approaches

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  3. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  4. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  5. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits...

  6. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  7. Safety and Security Officer

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  8. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  9. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  10. Operations Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  11. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  12. Cognitive Computing for Security.

    SciTech Connect

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  13. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  14. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  15. Energy Security Council

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  16. Data port security lock

    DOEpatents

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  17. Incidents of Security Concern

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  18. Secure Sensor Platform

    Energy Science and Technology Software Center

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  19. NNSA orders security enhancements

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    NNSA orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to stop at the East and West Jemez Road "Vehicle Access Portals" (VAPs) for a vehicle check. December 21, 2012 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience,

  20. Well Logging Security Initiatives | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  1. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  2. Extender for securing a closure

    SciTech Connect

    Thomas, II, Patrick A.

    2012-10-02

    An apparatus for securing a closure such as door or a window that opens and closes by movement relative to a fixed structure such as a wall or a floor. Many embodiments provide a device for relocating a padlock from its normal location where it secures a fastener (such as a hasp) to a location for the padlock that is more accessible for locking and unlocking the padlock. Typically an extender is provided, where the extender has a hook at a first end that is disposed through the eye of the staple of the hasp, and at an opposing second end the extender has an annulus, such as a hole in the extender or a loop or ring affixed to the extender. The shackle of the padlock may be disposed through the annulus and may be disposed through the eye of a second staple to secure the door or window in a closed or open position. Some embodiments employ a rigid sheath to enclose at least a portion of the extender. Typically the rigid sheath has an open state where the hook is exposed outside the sheath and a closed state where the hook is disposed within the sheath.

  3. An inter-realm, cyber-security infrastructure for virtual supercomputing

    SciTech Connect

    Al-Muhtadi, J.; Feng, W. C.; Fisk, M. E.

    2001-01-01

    Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ... In addition to announcing the reorganization, the NNSA has given its web site a make over. The revamped page showcases NNSA people and programs through interconnecting links. So, ...

  5. Security and Training | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  6. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  7. Office of Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Radiological Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero,

  8. Broader National Security Missions | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  9. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  10. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  11. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  12. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  13. Preliminary Notice of Violation, Los Alamos National Security, LLC -

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    WEA-2012-03 | Department of Energy - WEA-2012-03 Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2012-03 October 17, 2012 Issued to Los Alamos National Security, LLC, related to Four Electrical Safety-Related Events that occurred at the Los Alamos National Laboratory (LANL) On October 17, 2012the National Nuclear Security Administration issued a Preliminary Notice of Violation (WEA-2012-03) to Los Alamos National Security, LLC for violations of 10 C.F.R. 851

  14. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  15. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  16. Italy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Italy NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of

  17. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  18. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is

  19. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified

  20. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  1. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  2. Biological and Chemical Security

    SciTech Connect

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  3. Secure Information Sharing

    Energy Science and Technology Software Center

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  4. Ultra Safe And Secure Blasting System

    SciTech Connect

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  5. Secure content objects

    DOEpatents

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  6. Public key infrastructure for DOE security research

    SciTech Connect

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  7. Criteria & Review Approach Documents, National Nuclear Security Administration

    Energy.gov [DOE]

    A section of Appendix C to DOE G 226.1-2A "Federal Line Management Oversight of Department of Energy Nuclear Facilities." Consists of a table of National Nuclear Security Administration Criteria Review and Approach Documents (CRADS) with links to the CRADs. CRADs provide a recommended approach and the types of information to gather to assess elements of a DOE contractor's programs.

  8. Alamos National Security, LLC

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  9. Technical Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  10. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term

  11. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest

  12. DOE integrated safeguards and security (DISS) system a nation-wide distributed information system for personnel security

    SciTech Connect

    Block, B.

    1997-06-05

    DISS uses secure client-server and relational database technology across open networks to address the problems of security clearance request processing and tracking of security clearances for the Department of energy. The system supports the entire process from data entry by the prospective clearance holders through tracking of all DOE clearances, and use of standard DOE badges in automated access control systems throughout the DOE complex.

  13. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  14. AlumniLink: May 2015

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Join our highlighted LinkedIn discussion Join our highlighted LinkedIn discussion Descartes Labs is using deep learning technology developed at LANL to help us better...

  15. Transmission Line Security Monitor

    ScienceCinema

    None

    2016-07-12

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  16. Information Security Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  17. Information Security Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  18. Transmission Line Security Monitor

    SciTech Connect

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  19. Headquarters Security Operations

    Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  20. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  1. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  2. National Security System Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  3. Information Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  4. Security classification of information

    SciTech Connect

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  5. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 0930...

  6. AUDIT REPORT Security at the Nevada National Security Site

    Energy.gov [DOE] (indexed site)

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  7. Tag: national security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    national security Tag: national security Displaying 1 - 1 of 1... Category: News CNS and Knoxville Building and Construction Trades Council reach new agreement CNS management is pleased discussions between the two parties have resulted in a new labor agreement

  8. Sandia National Laboratories: National Security Missions: Global Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Programs Global Security Reducing cyber threats Tools and techniques to improve cyber defense and protect networks and data Reducing global chemical and biological dangers Technologies for rapid detection and characterization of chemical and biological threats Reducing global nuclear dangers Unique technical and policy solutions to reduce global nuclear and radiological dangers Cyber Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the

  9. Office of Radiological Security | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security The mp4 video format is not supported by this browser. Download video Captions: On Time: 3:37

  10. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  11. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  12. Safety and Security Interface Technology Initiative

    SciTech Connect

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  13. Natural language processing-based COTS software and related technologies survey.

    SciTech Connect

    Stickland, Michael G.; Conrad, Gregory N.; Eaton, Shelley M.

    2003-09-01

    Natural language processing-based knowledge management software, traditionally developed for security organizations, is now becoming commercially available. An informal survey was conducted to discover and examine current NLP and related technologies and potential applications for information retrieval, information extraction, summarization, categorization, terminology management, link analysis, and visualization for possible implementation at Sandia National Laboratories. This report documents our current understanding of the technologies, lists software vendors and their products, and identifies potential applications of these technologies.

  14. Secure key storage and distribution

    SciTech Connect

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  15. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security Tools Security Minutes New! SIMP Late Reporting Social Media Email Association Official Use Only (OUO) Majordomo Email List Risks Email Vacating Spaces Reporting Monitors Review and Approval Top of page

  16. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    This order cancels DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011, Physical ...

  17. Departmental Personnel Security- Clearance Automation

    Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  18. Facility Security Officer Contractor Toolcart

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    References: PERSEC F 5633.33, NNSA Personnel Security Clearance Action Request DOE F ... All SNL Members of the Worksforce granted a DOE Security Clearance are required to obtain ...

  19. National Security & Safety Reports | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    IG-0787 The Department's Cyber Security Incident Management Program January 2, 2008 Inspection Report: IG-0785 Incident of Security Concern at the Y-12 National Security Complex...

  20. Jeffrey R. Johnson | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    In that position, he was responsible for nuclear weapons security policy, security evaluations of Navy nuclear weapons facilities, and provided policy while coordinating security ...

  1. DOE - NNSA/NFO -- National Security Template

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Homeland Security NNSANFO Language Options U.S. DOENNSA - Nevada Field Office Homeland Security The U.S. Department of Energy (DOE) National Nuclear Security Administration ...

  2. Secure NEPA Documents | Department of Energy

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security ...

  3. Independent Oversight Review, Nevada National Security - May...

    Office of Environmental Management (EM)

    National Security - May 2013 Independent Oversight Review, Nevada National Security - May 2013 May 2013 Review of the Nevada National Security Site Criticality Safety Program ...

  4. Energy Surety: A Matter of National Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    and loads in an efficient and secure paradigm Secure Scalable Microgrid (SSM) The secure scalable microgrid (SSM) is a Sandia-developed grid architecture that divorces away ...

  5. Technical Security Program - DOE Directives, Delegations, and...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    470.6, Technical Security Program by Sam Soley Functional areas: Security, Counterintelligence This order implements the Department of Energy (DOE) Technical Security Program...

  6. Waste Isolation Pilot Plant Transportation Security | Department...

    Office of Environmental Management (EM)

    Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security (2.41 MB) More Documents & Publications Enterprise ...

  7. Safeguards and Security Program - DOE Directives, Delegations...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    4B Admin Chg 1, Safeguards and Security Program by Marc Brooks Functional areas: Administrative Change, Safeguards, Security, and Emergency Management, Safety, Safety and Security,...

  8. April 2014 | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

  9. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  10. Asian Energy Security

    SciTech Connect

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  11. David Telles wins NNSA Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    David Telles wins NNSA Security Professional of the Year award May 7, 2009 LOS ALAMOS, New Mexico, May 7, 2009 - David M. Telles, who leads Los Alamos National Laboratory's Vulnerability Analysis Office, received a 2008 National Nuclear Security Administration Security Professional of the Year award. NNSA administrator Tom D'Agostino said, "Our security professionals dedicate themselves to protecting some of the nation's most vital strategic assets, and in so doing, help advance broader

  12. accountability | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    accountability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  13. transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

  14. LEU | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    LEU NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... DOE/NNSA Successfully Establishes Uranium Lease and Takeback Program to Support Critical Medical Isotope Production In January 2016,

  15. NNSA | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense

  16. NSDD | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NSDD NNSA program strengthens national security from afar The Nuclear Smuggling Detection and Deterrence (NSDD) program is a key component of NNSA's core mission to reduce nuclear threats. The program, part of NNSA's Office of Defense Nuclear Nonproliferation, provides partners tools and training to deter, detect, and investigate smuggling of... NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security

  17. Secure computing for the 'Everyman'

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Secure computing for the 'Everyman' Secure computing for the 'Everyman' If implemented on a wide scale, quantum key distribution technology could ensure truly secure commerce, banking, communications and data transfer. September 2, 2014 This small device developed at Los Alamos National Laboratory uses the truly random spin of light particles as defined by laws of quantum mechanics to generate a random number for use in a cryptographic key that can be used to securely transmit information

  18. Protocol, Security Assistance- January 2007

    Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  19. Cyber Security Process Requirements Manual

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  20. Safeguard Security and Awareness Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  1. dhs | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    dhs NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... Federal Radiological Monitoring and Assessment Center The Federal Radiological Monitoring and Assessment Center (FRMAC) is a federal asset

  2. nnss | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nnss NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T Contract Award Provides Best

  3. ors | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ors NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA

  4. Armenia | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Armenia Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) joined the Republic of Armenia today to announce the safe and secure removal of three unused radioactive sources from two locations in Yerevan, Armenia. The successful completion of the radioactive source recovery campaign

  5. Nuclear Safeguards and Security Challenge:

    National Nuclear Security Administration (NNSA)

    Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards

  6. nest | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nest Emergency Response Planning for Emergencies Exercise Program Field Assistance and Oversight Liaison Homeland Security and Emergency Management Coordination HQ Emergency Management Team Responding to Emergencies Consequence Management First Responders Operations Render Safe Nuclear Forensics International... Nuclear Forensics The National Technical Nuclear Forensics (NTNF) program is a Homeland Security Council and National Security Council-sponsored policy initiative that establishes

  7. Website Policies and Important Links | OSTI, US Dept of Energy Office of

    Office of Scientific and Technical Information (OSTI)

    Scientific and Technical Information Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright Attribution Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Freedom of Information

  8. Page 11, Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    11 of 11 Previous Page Links Information for Employees & In-Processing DOE Order 3792.3 - Drug-Free Federal Workplace Testing http://www.archives.gov/federal-register/codification/executive-order/12564.html Flexible Spending Accounts (FSA) https://www.fsafeds.com/fsafeds/index.asp Pay & Pay Scales http://www.opm.gov/a-z-index/ Benefits Facts on Leave Programs http://www.opm.gov/policy-data-oversight/pay-leave/leave-administration/ Health Benefits

  9. CAMD Nanofabrication Links

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Research :: Publications :: Infrastructure :: Links :: Nanofabrication Facility in News Nano 50TM Awards: The Nano 50TM Awards, presented by Nanotech Briefs magazine, recognize the top 50 technologies, products and innovators that have significantly impacted, or are expected to impact, the state of the art in nanotechnology. "The winners of the Nano 50 awards are the best of the best - the innovative people and technologies that will continue to move nanotechnology to key mainstream

  10. Balanced link for dry coal extrusion pumps

    DOEpatents

    Bebejian, Maral

    2013-10-22

    A link which defines a link body that includes a multiple of link plates integral with a link body, the link body disposed at least partially forward of a forward edge of the multiple of link plates.

  11. Solar for Safety, Security, and Resilience Toolkit

    Energy.gov [DOE]

    There is a growing interest in using renewable energy options like solar to improve community resiliency. During extreme weather events, solar can help prevent power outages by providing emergency energy to critical facilities and recovery efforts. Solar can provide electricity to remote or less accessible areas, and is flexible enough to be a mobile or temporary power source. In addition to resiliency planning, there are efforts to promote new safety education and guidelines for solar installation, especially related to fire prevention. Also, there is rising interest in how solar can influence homeland security. The Solar for Safety, Security, and Resilience Toolkit demonstrates the different ways of thinking about and incorporating solar energy into ongoing public safety, homeland security, and resiliency initiatives.

  12. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2016-07-12

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  13. National Nuclear Security Administration

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ($ Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon Activities 241 242 252 10 Mixed Oxide Fuel Fabrication Facility (MOX) 340 332 270 (62) Defense Nuclear Nonproliferation (DNN) 77 58 91 33 Federal Expenses 4.7 5.2 5.4 .2 Total Budget for NNSA at SRS 662.7 637.2 618.4 (18.8)

  14. Security seal. [Patent application

    DOEpatents

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Global Security 2009

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    523744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch

  16. planning for emergencies | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    planning for emergencies HQ Emergency Management Team (EMT) NNSA's Headquarters (HQ) EMT is the sole emergency focal point for HQ during an emergency. The HQ EMT acquires and manages event-related information, monitors HQ and field response actions, coordinates with other federal agencies, and receives/elicits emergency-related information: ... Homeland Security and Emergency Management Coordination (HSEMC) Program The Office of Emergency Management assists the NNSA and Department of Energy

  17. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Energy Saver

    Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security ...

  18. Santa | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Santa Santa Even Santa was subjected to security checks

  19. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  20. Office of Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Office of Security Mission The Office of Security maintains and promotes the Department of Energy's corporate security strategies for the preservation of National Security and protection of critical assets entrusted to the Department. The Office of Security executes this mission through the development and promulgation of safeguards and security policy, by providing comprehensive security expertise to assist Headquarters and field elements in planning site protection strategies and

  1. Departmental Personnel Security - Implementation Guidance | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Departmental Personnel Security - Implementation Guidance Implementation Guidance Overview of Security ClearanceAccess Authorization Process for Applicants Drug Testing ...

  2. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    violations of Department of Energy's classified information security program ... Sheet, Preliminary Notice of Violation: Classified Information Security Event at NNSS ...

  3. National Nuclear Security Administration Appropriation and Program...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security Administration ...

  4. Microsoft Word - Critical Infrastructure Security and Resilience...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2013 CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE MONTH, 2013 - - - - - - - BY THE ...

  5. History of the Energy Department's Role in Nuclear Security ...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    role in securing nuclear materials. Addthis Related Articles In the photo above, a robot investigates a bomb threat at an arcade during the 2013 Robot Rodeo at Sandia Labs....

  6. Security Improvements Project Completed Ahead of Schedule, $20...

    National Nuclear Security Administration (NNSA)

    2010 (1) July 2010 (1) June 2010 (5) April 2010 (2) January 2010 (1) December 2009 (1) 1 of 3 Related Topics apm project management llnl defense nuclear security Y-12 npo...

  7. Preliminary Notice of Violation, Los Alamos National Security...

    Energy.gov [DOE] (indexed site)

    National Security, LLC related to the Electrical Shock that occurred at Technical Area ... of 10 C.F.R. 851 associated with an electrical shock event that occurred in building ...

  8. T-642: RSA SecurID update to Customers

    Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

  9. Maximum Entry and Mandatory Separation Ages for Certain Security Employees

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    2001-10-11

    The Policy in response to government-wide Office of Personnel Management regulations regarding establishment of mandatory retirement ages for employees in certain security related positions. Superseded by DOE P 310.1 Admin Chg 1, 12-1-11.

  10. Preliminary Notice of Violation, Los Alamos National Security, LLC

    Energy.gov [DOE]

    Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Los Alamos National Security, LLC for violations of 10 C.F.R. Part 851 relating to electrical safety

  11. Nevada National Security Site | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point Nevada National Security Site's (NNSS) current mission includes support for the NNSA stockpile stewardship program, which includes performing subcritical experiments in support of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and

  12. Cyberspace security system

    DOEpatents

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  13. Dye filled security seal

    DOEpatents

    Wilson, Dennis C. W.

    1982-04-27

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

  14. Security - VOLTTRON 2016

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security CRAIG ALLWARDT August 11, 2016 1 Pacific Northwest National Laboratory VOLTTRON TM 2016 PNNL-SA-119968 Overview ► Background ► Creating keys and authorization. ► Demo August 11, 2016 2 Background ► ZeroMQ's ZeroMQ Authentication Protocol (ZAP) ■ http://rfc.zeromq.org/spec:27/ZAP/ ■ Eliptic Curve ■ Long term public and secret key ■ Short term communication keys based upon the public and secret key. ► VOLTTRON TM Interconnect Protocol (VIP) ■

  15. Army Energy Security Considerations

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703)-601-0374 E-mail: don.juhasz@hqda.army.mil FUEL CELL OPPORTUNITIES 26 April 2007 1 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy * * * * FOREIGN OIL 2 of 10 Don Juhasz DAIM-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 World Energy Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed

  16. office of secure transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    office of secure transportation Eight new couriers make the grade, join NNSA's Office of Secure Transportation Earlier this month, the Office of Secure Transportation (OST) welcomed eight new Nuclear Material Courier Federal Agents into the fold during a graduation ceremony at Kirtland Air Force Base in Albuquerque, NM. The selection process is rigorous for this vital position, and fewer than 2 percent of... Acquisition and Project Management Office volunteers get up-close look at Office of

  17. New institute promotes nuclear security | Y-12 National Security...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    New institute promotes ... New institute promotes nuclear security Posted: February 11, ... experience to help solve international nuclear challenges? "A lot of the keys for ...

  18. Office of Radiological Security: extended | Y-12 National Security Complex

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Security: extended The mp4 video format is not supported by this browser. Download video Captions: On Time: 8:19

  19. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    This document reviews several key operational cyber security elements that are important for control systems and industrial networks and how those elements can drive the creation ...

  20. Links - MST - UW Plasma Physics

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Links UW Madison Madison Symmetric Torus Links MST HomeGraduate Student InformationLinksTourControl and Auxiliary SystemsPhysics TopicsDeviceResearch MissionMST People mst logo CPLA Home Directory Publications Links Internal University of Wisconsin Physics Department Research funding includes support from: Department of Energy National Science Foundation Other Reversed Field Pinch Experiments around the world: RFX-mod in Padua, Italy Extrap-T2R in Stockhom, Sweden RELAX at Kyoto Institute of

  1. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at LANL

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    LANL On May 27, 2015 the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Los Alamos National Security, LLC (LANS) for violations of Department of Energy (DOE) classified information security program requirements. LANS is the management and operating contractor for NNSA's Los Alamos National Laboratory (LANL), located in Los Alamos, New Mexico. The PNOV cites three violations of Departmental classified information security requirements related to

  2. Fact Sheet Preliminary Notice of Violation: Classified Information Security Event at SNL

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SNL On May 27, 2015, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation (PNOV) to Sandia Corporation (Sandia) for violations of Department of Energy (DOE) classified information security program requirements. Sandia is the management and operating contractor for NNSA's Sandia National Laboratories (SNL), located in Albuquerque, New Mexico. The PNOV cites six violations of Departmental classified information security requirements related to a security

  3. LBNL SecureMessaging

    SciTech Connect

    Pery, Marcia; Agarwal, Deb

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanent and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.

  4. Security classification of information

    SciTech Connect

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  5. LBNL SecureMessaging

    Energy Science and Technology Software Center

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanentmore » and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.« less

  6. Safeguards and Security Program

    Directives, Delegations, and Other Requirements [Office of Management (MA)]

    1995-09-28

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  7. Multilevel DC link inverter

    DOEpatents

    Su, Gui-Jia

    2003-06-10

    A multilevel DC link inverter and method for improving torque response and current regulation in permanent magnet motors and switched reluctance motors having a low inductance includes a plurality of voltage controlled cells connected in series for applying a resulting dc voltage comprised of one or more incremental dc voltages. The cells are provided with switches for increasing the resulting applied dc voltage as speed and back EMF increase, while limiting the voltage that is applied to the commutation switches to perform PWM or dc voltage stepping functions, so as to limit current ripple in the stator windings below an acceptable level, typically 5%. Several embodiments are disclosed including inverters using IGBT's, inverters using thyristors. All of the inverters are operable in both motoring and regenerating modes.

  8. Documents Related to the ICP

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    & Solicitations > ICP Contract > Documents Related ICP Blue Line Free Acrobat Reader Link The documents listed below are related to the Idaho Cleanup Project (ICP) contract. ...

  9. Aviation security: A system's perspective

    SciTech Connect

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  10. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  11. policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    policy DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA Deputy promotes collaboration on global deterrence at USSTRATCOM deterrence symposium Last month more than 650

  12. DOE | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    DOE DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy Administrator Madelyn Creedon, and numerous speakers from throughout the Nuclear Security Enterprise spoke at the 2016 Nuclear Weapons Physical Security Collaboration Summit earlier this month at Joint Base Andrews in... NNSA & DOE Employees Use Tiny Smartphone Microscopes to Teach STEM Users discovered items the device could magnify, such

  13. Principal Associate Director - Global Security

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Principal Associate Director - Global Security As Principal Associate Director for Global Security, Terry Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505) 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C.

  14. China | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    China U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... NNSA Deputy Administrator Creedon Travels to China In March, National Nuclear Security

  15. budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    budget National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and Effective Nuclear Deterrent; Prevent, Counter, and Respond to Global Nuclear Dangers; and Effectively Power the Nuclear Navy (WASHINGTON) - The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) today... FY2016 Budget Request: Positioned for the 21st Century Mission Delivery Washington, DC - U.S. Department of Energy

  16. cdns | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cdns Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes,

  17. contracts | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    contracts NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... NNSA Makes Up to $200 Million in Awards to Five Small Business Teams for Enterprise-Wide Management, Organizational and Administrative Support

  18. mac | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    mac Military Academy Cadet/Midshipman Program This program places military academy cadets/midshipmen in tours of duty within science, technology, engineering, national security, and relevant fields at any of the NNSA sites. Participants will expand their understanding of the NNSA National Security Enterprise and Department of Defense programs... Military Academic Collaborations The National Nuclear Security Administration (NNSA) Office of Defense Programs offers a suite of activities to enhance

  19. operations | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    operations NNSA Achieves Major Milestone in BUILDER Implementation WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) achieved a major milestone in improving the management of the Nuclear Security Enterprise's infrastructure through the successful migration of all current information on building... Infrastructure and Operations NNSA's missions require a secure production and laboratory infrastructure meeting immediate and long term needs. The

  20. ost | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ost Eight new couriers make the grade, join NNSA's Office of Secure Transportation Earlier this month, the Office of Secure Transportation (OST) welcomed eight new Nuclear Material Courier Federal Agents into the fold during a graduation ceremony at Kirtland Air Force Base in Albuquerque, NM. The selection process is rigorous for this vital position, and fewer than 2 percent of... Office of Secure Transportation Celebrates 40th Anniversary On Thursday morning, Dec. 17, NNSA's Office of Defense