Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-07
... Information Collection Activity Under OMB Review: Highway Corporate Security Review AGENCY: Transportation... industry by way of its Highway Corporate Security Review (CSR) Program, which encompasses site visits and... Title: Highway Corporate Security Review. Type of Request: Extension of a currently approved collection...
Remote video assessment for missile launch facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.; Stewart, W.A.
1995-07-01
The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less
High-Security Fencing for Rail Right-of-way Applications : Current Use and Best Practices.
DOT National Transportation Integrated Search
2015-10-01
The Volpe Center investigated how high-security fencing is used to prevent right-of-way (ROW) trespassing at several urban transit and commuter rail agencies in the United States. Interviews, operations documentation, and site visits were used to gat...
Nevada National Security Site Environmental Report 2012 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy A
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Nevada National Security Site Environmental Report 2013 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, andmore » assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
CrossTalk: The Journal of Defense Software Engineering. Volume 19, Number 5
2006-05-01
Coming Events Web Sites Call for Articles Visit CrossTalk at the SSTC BackTalk Transforming: Business , Security ,Warfighting CrossTalk 76 SMXG CO-SPONSOR...theme “Transforming: Business , Security , Warfighting.” Transformation is not just the current buzzword: Many industries and the military have...systems. Transforming: Business , Security ,Warfighting Characteristic edocfosenilnoillim001-01eziS Number of external interfaces 30-300 Number of
Nevada National Security Site Environmental Report 2011 Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed.
2012-09-12
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operationsmore » on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
17 CFR 240.17g-5 - Conflicts of interest.
Code of Federal Regulations, 2014 CFR
2014-04-01
... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...
17 CFR 240.17g-5 - Conflicts of interest.
Code of Federal Regulations, 2010 CFR
2010-04-01
... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...
17 CFR 240.17g-5 - Conflicts of interest.
Code of Federal Regulations, 2013 CFR
2013-04-01
... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...
17 CFR 240.17g-5 - Conflicts of interest.
Code of Federal Regulations, 2011 CFR
2011-04-01
... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...
17 CFR 240.17g-5 - Conflicts of interest.
Code of Federal Regulations, 2012 CFR
2012-04-01
... section relating to issuing or maintaining a credit rating for a security or money market instrument... site a list of each such security or money market instrument for which it is currently in the process... or money market instrument, the name of the issuer, the date the rating process was initiated, and...
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some of the results were received in the study carried out within the framework of certification for compliance with information security requirements. The paper provides the results of consolidating information about the attack and protection measures, which are currently used by the developers of web-applications. It specifies results of the study, which demonstrate various distribution types: distribution of identified vulnerabilities as per the developer type (Russian and foreign), distribution of the security measures used in web-applications, distribution of the identified vulnerabilities as per the programming languages, data on the number of security measures that are used in the studied web-applications. The results of the study show that in most cases the developers of web-applications do not pay due attention to protection against cross-site request forgery attacks. The authors give recommendations to the developers that are planning to undergo a certification process for their software applications.
Nevada National Security Site Environmental Report 2016, Attachment A: Site Description
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current sitemore » operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.« less
Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills
2013-02-24
Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.
2013-07-01
Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively. (authors)« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... to Extraordinary Market Volatility April 6, 2011. Pursuant to Section 19(b)(1) of the Securities... volatility. The text of the proposed rule change is available on the Exchange's Web site at http://www.nsx... currently in effect regarding trading pauses in individual securities due to extraordinary market volatility...
78 FR 53821 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-30
...: Excess Comments: Off-site removal only; 8,736 sq. ft.; current use: Administrative office; fair....; Admin. 3 mons. vacant; fair conditions; w/in secured area; contact Army for accessibility/ removal reqs... Number: 21201310012 Status: Excess Comments: Off-site removal only; 2,100 sf.; Admin.; fair conditions; w...
78 FR 15127 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-08
..., 913 Comments: Off-site removal only; sf varies; housing; fair to poor conditions; asbestos and lead.... ft.; current use: Administrative office; fair conditions--bldg. need repairs; possible asbestos 10...: Excess Comments: Off-site removal only; 4,100 sf.; Admin. 3 mons. vacant; fair conditions; w/in secured...
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surya V.; Thronas, Aaron I.
2010-01-01
This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.
Secure Genomic Computation through Site-Wise Encryption
Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu
2015-01-01
Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients’ genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds. PMID:26306278
Secure Genomic Computation through Site-Wise Encryption.
Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu
2015-01-01
Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients' genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds.
International Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, James E.
2012-08-14
This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less
ERIC Educational Resources Information Center
Fearon, R. M. Pasco; Van IJzendoorn, Marinus H.; Fonagy, Peter; Bakermans-Kranenburg, Marian J.; Schuengel, Carlo; Bokhorst, Caroline L.
2006-01-01
The current article presents results from a twin study of genetic and environmental components of maternal sensitivity and infant attachment and their association. The sample consisted of 136 twin pairs from 2 sites: Leiden, the Netherlands, and London, UK. Maternal sensitivity was assessed in the home at 9-10 months, and infant attachment…
Nevada National Security Site Radiological Control Manual
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radiological Control Managers’ Council
2012-03-26
This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted bymore » programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of low-level radioactive waste and the handling of radioactive sources. Remediation of contaminated land areas may also result in radiological exposures.« less
2015-06-01
National Instruments. The National Instruments DAQ is a full-featured PC running Windows 7. The DAQ, electromagnetic transmitter , and batteries for the... electromagnetic induction Environet Environet, Inc. ESTCP Environmental Security Technology Certification Program ftp file transfer protocol FUDS formerly used...capabilities of a currently available advanced electromagnetic induction sensor developed specifically for discrimination on real sites under operational
DICOM image secure communications with Internet protocols IPv6 and IPv4.
Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen
2007-01-01
Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Silvas, A. J.
The purpose of this Post-Closure Strategy is to provide a consistent methodology for continual evaluation of post-closure requirements for use-restricted areas on the Nevada National Security Site (NNSS), Nevada Test and Training Range (NTTR), and Tonopah Test Range (TTR) to consolidate, modify, or streamline the program. In addition, this document stipulates the creation of a single consolidated Post-Closure Plan that will detail the current post-closure requirements for all active use restrictions (URs) and outlines its implementation and subsequent revision. This strategy will ensure effective management and control of the post-closure sites. There are currently over 200 URs located on themore » NNSS, NTTR, and TTR. Post-closure requirements were initially established in the Closure Report for each site. In some cases, changes to the post-closure requirements have been implemented through addenda, errata sheets, records of technical change, or letters. Post-closure requirements have been collected from these multiple sources and consolidated into several formats, such as summaries and databases. This structure increases the possibility of inconsistencies and uncertainty. As more URs are established and the post-closure program is expanded, the need for a comprehensive approach for managing the program will increase. Not only should the current requirements be obtainable from a single source that supersedes all previous requirements, but the strategy for modifying the requirements should be standardized. This will enable more effective management of the program into the future. This strategy document and the subsequent comprehensive plan are to be implemented under the assumption that the NNSS and outlying sites will be under the purview of the U.S. Department of Energy, National Nuclear Security Administration for the foreseeable future. This strategy was also developed assuming that regulatory control of the sites remains static. The comprehensive plan is not intended to be a permanent long-term stewardship plan. However, it is intended to clarify requirements and identify components to effectively manage the sites until regulatory requirements are met or management of the site changes. The Environmental Management Program is required to manage these sites until the NNSS Environmental Restoration program is completed, currently planned for 2030. Prior to completion of the Environmental Restoration program, additional planning will be conducted to ensure that long-term stewardship of the sites is maintained. A comprehensive post-closure plan can be transitioned effectively into any future site-wide long-term stewardship program that may be developed. Therefore, the post-closure plan will include current aspects of the post-closure program that are also important aspects of long-term stewardship, including the following: • Management of physical and engineering controls such as fences, signs, and soil covers • Management of institutional and administrative controls such as use restrictions and real estate systems • Management of monitoring and maintenance programs • Management of information related to the sites such as geographic information system data and related documentation The strategy will also allow for periodic review and modification of any aspect of the program to ensure continued effectiveness.« less
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.
2009-10-14
The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less
Used fuel extended storage security and safeguards by design roadmap
DOE Office of Scientific and Technical Information (OSTI.GOV)
Durbin, Samuel G.; Lindgren, Eric Richard; Jones, Robert
2016-05-01
In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. Amore » set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.« less
Code of Federal Regulations, 2011 CFR
2011-01-01
... Web site. (To find the current fee amount, go to the Electronic Submittals page at http://www.nrc.gov... licensee verifies information such as name, date of birth, social security number, sex, and other...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Web site. (To find the current fee amount, go to the Electronic Submittals page at http://www.nrc.gov... licensee verifies information such as name, date of birth, social security number, sex, and other...
Thermic sealing in femoral catheterisation: First experience with the Secure Device.
Sacherer, Michael; Kolesnik, Ewald; von Lewinski, Friederike; Verheyen, Nicolas; Brandner, Karin; Wallner, Markus; Eaton, Deborah M; Luha, Olev; Zweiker, Robert; von Lewinski, Dirk
2018-04-03
Devices currently used to achieve hemostasis of the femoral artery following percutaneous cardiac catheterization are associated with vascular complications and remnants of artificial materials are retained at the puncture site. The SECURE arterial closure device induces hemostasis by utilizing thermal energy, which causes collagen shrinking and swelling. In comparison to established devices, it has the advantage of leaving no foreign material in the body following closing. This study was designed to evaluate the efficacy and safety of the SECURE device to close the puncture site following percutaneous cardiac catheterization. The SECURE device was evaluated in a prospective non-randomized single-centre trial with patients undergoing 6 F invasive cardiac procedures. A total of 67 patients were enrolled and the device was utilized in 63 patients. 50 diagnostic and 13 interventional cases were evaluated. Femoral artery puncture closure was performed immediately after completion of the procedure. Time to hemostasis (TTH), time to ambulation (TTA) and data regarding short-term and 30-day clinical follow-up were recorded. Mean TTH was 4:30 ± 2:15 min in the overall observational group. A subpopulation of patients receiving anticoagulants had a TTH of 4:53 ± 1:43 min. There were two access site complications (hematoma > 5 cm). No major adverse events were identified during hospitalization or at the 30 day follow-up. The new SECURE device demonstrates that it is feasible in diagnostic and interventional cardiac catheterization. With respect to safety, the SECURE device was non-inferior to other closure devices as tested in the ISAR closure trial.
ERIC Educational Resources Information Center
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.
2003-01-01
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
Code of Federal Regulations, 2010 CFR
2010-07-01
... on Treasury's Bureau of the Public Debt Web site at http://www.treasurydirect.gov. You may also..., Bureau of the Public Debt, Office of the Commissioner, Government Securities Regulations Staff, 799 9th...
Security concept in 'MyAngelWeb' a website for the individual patient at risk of emergency.
Pinciroli, F; Nahaissi, D; Boschini, M; Ferrari, R; Meloni, G; Camnasio, M; Spaggiari, P; Carnerone, G
2000-11-01
We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.
Security concept in 'MyAngelWeb((R))' a website for the individual patient at risk of emergency.
Pinciroli; Nahaissi; Boschini; Ferrari; Meloni; Camnasio; Spaggiari; Carnerone
2000-11-01
We describe the Security Plan for the 'MyAngelWeb' service. The different actors involved in the service are subject to different security procedures. The core of the security system is implemented at the host site by means of a DBMS and standard Information Technology tools. Hardware requirements for sustainable security are needed at the web-site construction sites. They are not needed at the emergency physician's site. At the emergency physician's site, a two-way authentication system (password and test phrase method) is implemented.
Integrated homeland security system with passive thermal imaging and advanced video analytics
NASA Astrophysics Data System (ADS)
Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert
2007-04-01
A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.
Airborne and Ground-Based Optical Characterization of Legacy Underground Nuclear Test Sites
NASA Astrophysics Data System (ADS)
Vigil, S.; Craven, J.; Anderson, D.; Dzur, R.; Schultz-Fellenz, E. S.; Sussman, A. J.
2015-12-01
Detecting, locating, and characterizing suspected underground nuclear test sites is a U.S. security priority. Currently, global underground nuclear explosion monitoring relies on seismic and infrasound sensor networks to provide rapid initial detection of potential underground nuclear tests. While seismic and infrasound might be able to generally locate potential underground nuclear tests, additional sensing methods might be required to further pinpoint test site locations. Optical remote sensing is a robust approach for site location and characterization due to the ability it provides to search large areas relatively quickly, resolve surface features in fine detail, and perform these tasks non-intrusively. Optical remote sensing provides both cultural and surface geological information about a site, for example, operational infrastructure, surface fractures. Surface geological information, when combined with known or estimated subsurface geologic information, could provide clues concerning test parameters. We have characterized two legacy nuclear test sites on the Nevada National Security Site (NNSS), U20ak and U20az using helicopter-, ground- and unmanned aerial system-based RGB imagery and light detection and ranging (lidar) systems. The multi-faceted information garnered from these different sensing modalities has allowed us to build a knowledge base of how a nuclear test site might look when sensed remotely, and the standoff distances required to resolve important site characteristics.
78 FR 38017 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-25
... at the Defense Privacy and Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs... media.'' * * * * * Safeguards: Delete entry and replace with ``Electronic data files reside in.... Individuals should provide full name, Social Security Number, current address and telephone number and, if...
Nevada National Security Site Environmental Report 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1999-09-28
Since the completion of remedial activities at the site, the Quincy landfill 2 and 3 site poses no apparent public health hazard. No one is currently exposed to contamination at the site. Any past exposure would not have been at levels of health concern. Based on current conditions, IDPH recommends that the Quincy Landfill 2 and 3 participating respondents group: Encourage the homeowner 1/2 mile west of the site to connect to Mill Creek Public Water supply and to seal the private well to eliminate possible exposure to site-related contaminants in groundwater; provide groundwater containment and treatment if groundwater cleanupmore » levels are not met and maintained; continue proper maintenance of the leachate collection system and tank; maintain the landfill cap, particularly to address any erosion that occurs; and maintain a 6-foot-high security fence around the perimeter of the site to prevent trespassing.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study
ERIC Educational Resources Information Center
Zhao, Jensen; Zhao, Sherry Y.
2015-01-01
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-27
.... NSCC believes it can offer a number of control improvements to the current manual, decentralized, and...: Electronic Comments Use the Commission's Internet comment form ( http://www.sec.gov/rules/sro.shtml ); or... one method. The Commission will post all comments on the Commission's Internet Web site ( http://www...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... populations and individuals, the lack of information about the species' biology, and the magnitude of current...; and securing extant populations are the most immediate priorities. Downlisting of S. gentianoides from endangered to threatened status will be considered when: (1) Extant populations and newly discovered sites...
Nevada National Security Site Environmental Report Summary 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS andmore » offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and centers that support the National Security/Defense mission include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility (DAF), National Criticality Experiments Research Center (NCERC) located in the DAF, Joint Actinide Shock Physics Experimental Research (JASPER) Facility, Dense Plasma Focus (DPF) Facility located in the Los Alamos Technical Facility (LATF), and the Radiological/ Nuclear Countermeasures Test and Evaluation Complex (RNCTEC). Facilities that support the Environmental Management mission include the Area 5 Radioactive Waste Management Complex (RWMC) and the Area 3 Radioactive Waste Management Site (RWMS), which has been in cold standby since 2006.« less
Fermilab Security Site Access Request Database
Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Municipal securities...
17 CFR 240.15c2-12 - Municipal securities disclosure.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Internet Web site or filed with the Commission. (4) The term issuer of municipal securities means the... the public on the Municipal Securities Rulemaking Board's Internet Web site or filed with the... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Municipal securities...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE... § 250.1634 Site security. (a) All locations where sulphur is produced, measured, or stored shall be...
Using RFID to Enhance Security in Off-Site Data Storage
Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638
Using RFID to enhance security in off-site data storage.
Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R
2010-01-01
Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
... to Extraordinary Market Volatility August 2, 2012. Pursuant to Section 19(b)(1) of the Securities... volatility. The text of the proposed rule change is available on the Exchange's Web site at http://www.nsx... volatility under NSX Rule 11.20B. Currently, unless otherwise extended or approved permanently, this pilot...
Security Design Flaws That Affect Usability in Online Banking
ERIC Educational Resources Information Center
Gurlen, Stephanie
2013-01-01
As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…
Web vulnerability study of online pharmacy sites.
Kuzma, Joanne
2011-01-01
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.
Computer-Based Testing: Test Site Security.
ERIC Educational Resources Information Center
Rosen, Gerald A.
Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Programs
2010-10-04
The Nevada National Security Site (NNSS) is located approximately 105 km (65 mi) northwest of Las Vegas, Nevada. The U.S. Department of Energy National Nuclear Security Administration Nevada Site Office (NNSA/NSO) is the federal lands management authority for the NNSS and National Security Technologies, LLC (NSTec) is the Management and Operations contractor. Access on and off the NNSS is tightly controlled, restricted, and guarded on a 24-hour basis. The NNSS is posted with signs along its entire perimeter. NSTec is the operator of all solid waste disposal sites on the NNSS. The Area 5 Radioactive Waste Management Site (RWMS) ismore » the location of the permitted facility for the Solid Waste Disposal Site (SWDS). The Area 5 RWMS is located near the eastern edge of the NNSS (Figure 1), approximately 26 km (16 mi) north of Mercury, Nevada. The Area 5 RWMS is used for the disposal of low-level waste (LLW) and mixed low-level waste. Many areas surrounding the RWMS have been used in conducting nuclear tests. The site will be used for the disposal of regulated Asbestiform Low-Level Waste (ALLW), small quantities of low-level radioactive hydrocarbon-burdened (LLHB) media and debris, LLW, LLW that contains Polychlorinated Biphenyl (PCB) Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water, and small quantities of LLHB demolition and construction waste (hereafter called permissible waste). Waste containing free liquids, or waste that is regulated as hazardous waste under the Resource Conservation and Recovery Act (RCRA) or state-of-generation hazardous waste regulations, will not be accepted for disposal at the site. Waste regulated under the Toxic Substances Control Act (TSCA) that will be accepted at the disposal site is regulated asbestos-containing materials (RACM) and PCB Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water. The term asbestiform is used throughout this document to describe RACM. The disposal site will be used as a depository of permissible waste generated both on site and off site. All generators designated by NNSA/NSO will be eligible to dispose regulated ALLW at the Asbestiform Low-Level Waste Disposal Site in accordance with the DOE/NV-325, Nevada National Security Site Waste Acceptance Criteria (NNSSWAC, current revision). Approval will be given by NNSA/NSO to generators that have successfully demonstrated through process knowledge (PK) and/or sampling and analysis that the waste is low-level, contains asbestiform material, or contains PCB Bulk Product Waste greater than 50 ppm that leaches at a rate of less than 10 micrograms of PCB per liter of water, or small quantities of LLHB demolition and construction waste and does not contain prohibited waste materials. Each waste stream will be approved through the Radioactive Waste Acceptance Program (RWAP), which ensures that the waste meets acceptance requirements outlined in the NNSSWAC.« less
EDOS Evolution to Support NASA Future Earth Sciences Missions
NASA Technical Reports Server (NTRS)
Cordier, Guy R.; McLemore, Bruce; Wood, Terri; Wilkinson, Chris
2010-01-01
This paper presents a ground system architecture to service future NASA decadal missions and in particular, the high rate science data downlinks, by evolving EDOS current infrastructure and upgrading high rate network lines. The paper will also cover EDOS participation to date in formulation and operations concepts for the respective missions to understand the particular mission needs and derived requirements such as data volumes, downlink rates, data encoding, and data latencies. Future decadal requirements such as onboard data recorder management and file protocols drive the need to emulate these requirements within the ground system. The EDOS open system modular architecture is scalable to accommodate additional missions using the current sites antennas and future sites as well and meet the data security requirements and fulfill mission's objectives
Sonic CPT Probing in Support of DNAPL Characterization
2000-11-21
directed at developing advanced sensors for delivery by the cone penetrometer. To accommodate these new sensors , probe sizes have increased (from 1.44-in...capability of the CPT, a sonic vibratory system was integrated with conventional CPT to advance cone penetrometer sensor packages past currently attainable...Sonic, Cone Penetrometer, Site Characterization, Fluorescense, Sensor , Shock Hardened Sensors , Geoprobe• 17. SECURITY CLASSIFICATION OF REPORT
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-14
... login fees. The text of the proposed rule change is available on the Exchange's Web site ( http://www... Schedule of Fees regarding the Exchange's API or login fees. ISE currently charges its Members a fee for each login that a Member utilizes for quoting or order entry, with a lesser charge for logins used for...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-13
... login fees. The text of the proposed rule change is available on the Exchange's Web site ( http://www... Schedule of Fees regarding the Exchange's API or login fees. ISE currently charges its members a fee for each login that a Member utilizes for quoting or order entry, with a lesser charge for logins used for...
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
Code of Federal Regulations, 2010 CFR
2010-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2012 CFR
2012-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2011 CFR
2011-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2014 CFR
2014-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
Code of Federal Regulations, 2013 CFR
2013-10-01
... to protect the security and integrity of urine collections? 40.43 Section 40.43 Transportation Office... PROGRAMS Collection Sites, Forms, Equipment and Supplies Used in DOT Urine Collections § 40.43 What steps must operators of collection sites take to protect the security and integrity of urine collections? (a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Strader, Cliff; Richter, Bonnie
2013-01-23
The Worker Health at a Glance, 2000 – 2009 provides an overview of selected illness and injury patterns among the current DOE contractor workforce that have emerged over the 10-years covered by this report. This report is a roll-up of data from 16 individual DOE sites, assigned to one of three program offices (Office of Environmental Management, Office of Science and the National Nuclear Security Administration). In this report, an absences is defined as 40 or more consecutive work hours (5+ calendar days) off the job. Shorter absences were not included.
Nevada National Security Site Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, C.
2014-09-09
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi
2017-08-01
Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.
NASA Astrophysics Data System (ADS)
Patel, M. N.; Young, K.; Halling-Brown, M. D.
2018-03-01
The demand for medical images for research is ever increasing owing to the rapid rise in novel machine learning approaches for early detection and diagnosis. The OPTIMAM Medical Image Database (OMI-DB)1,2 was created to provide a centralized, fully annotated dataset for research. The database contains both processed and unprocessed images, associated data, annotations and expert-determined ground truths. Since the inception of the database in early 2011, the volume of images and associated data collected has dramatically increased owing to automation of the collection pipeline and inclusion of new sites. Currently, these data are stored at each respective collection site and synced periodically to a central store. This leads to a large data footprint at each site, requiring large physical onsite storage, which is expensive. Here, we propose an update to the OMI-DB collection system, whereby the storage of all the data is automatically transferred to the cloud on collection. This change in the data collection paradigm reduces the reliance of physical servers at each site; allows greater scope for future expansion; and removes the need for dedicated backups and improves security. Moreover, with the number of applications to access the data increasing rapidly with the maturity of the dataset cloud technology facilities faster sharing of data and better auditing of data access. Such updates, although may sound trivial; require substantial modification to the existing pipeline to ensure data integrity and security compliance. Here, we describe the extensions to the OMI-DB collection pipeline and discuss the relative merits of the new system.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-02
..., Including On-Site Leased Workers From Westaff, Supply Technologies, Aerotek, and Securitas Security Services..., including on-site leased workers from Westaff, Supply Technologies, Aerotek and Securitas Security Services... was amended on December 6, 2010 to include on- site leased workers from Supply Technologies. The...
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Final Report: Sensorpedia Phases 1 and 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gorman, Bryan L; Resseguie, David R
2010-08-01
Over the past several years, ORNL has been actively involved in research to formalize the engineering principles and best practices behind emerging social media and social networking concepts to solve real-time data sharing problems for national security and defense, public health and safety, environmental and infrastructure awareness, and disaster preparedness and response. Sensorpedia, an ORNL web site, is a practical application of several key social media principles. Dubbed the Wikipedia for sensors, Sensorpedia is currently in limited BETA testing and was selected in 2009 by Federal Computer Week as one of the government s top 10 social networking sites.
ViPAR: a software platform for the Virtual Pooling and Analysis of Research Data.
Carter, Kim W; Francis, Richard W; Carter, K W; Francis, R W; Bresnahan, M; Gissler, M; Grønborg, T K; Gross, R; Gunnes, N; Hammond, G; Hornig, M; Hultman, C M; Huttunen, J; Langridge, A; Leonard, H; Newman, S; Parner, E T; Petersson, G; Reichenberg, A; Sandin, S; Schendel, D E; Schalkwyk, L; Sourander, A; Steadman, C; Stoltenberg, C; Suominen, A; Surén, P; Susser, E; Sylvester Vethanayagam, A; Yusof, Z
2016-04-01
Research studies exploring the determinants of disease require sufficient statistical power to detect meaningful effects. Sample size is often increased through centralized pooling of disparately located datasets, though ethical, privacy and data ownership issues can often hamper this process. Methods that facilitate the sharing of research data that are sympathetic with these issues and which allow flexible and detailed statistical analyses are therefore in critical need. We have created a software platform for the Virtual Pooling and Analysis of Research data (ViPAR), which employs free and open source methods to provide researchers with a web-based platform to analyse datasets housed in disparate locations. Database federation permits controlled access to remotely located datasets from a central location. The Secure Shell protocol allows data to be securely exchanged between devices over an insecure network. ViPAR combines these free technologies into a solution that facilitates 'virtual pooling' where data can be temporarily pooled into computer memory and made available for analysis without the need for permanent central storage. Within the ViPAR infrastructure, remote sites manage their own harmonized research dataset in a database hosted at their site, while a central server hosts the data federation component and a secure analysis portal. When an analysis is initiated, requested data are retrieved from each remote site and virtually pooled at the central site. The data are then analysed by statistical software and, on completion, results of the analysis are returned to the user and the virtually pooled data are removed from memory. ViPAR is a secure, flexible and powerful analysis platform built on open source technology that is currently in use by large international consortia, and is made publicly available at [http://bioinformatics.childhealthresearch.org.au/software/vipar/]. © The Author 2015. Published by Oxford University Press on behalf of the International Epidemiological Association.
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 2 2014-07-01 2014-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
Audit of the management and cost of the Department of Energy`s protective forces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-07-01
The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in fullmore » production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.« less
Use of a secure Internet Web site for collaborative medical research.
Marshall, W W; Haley, R W
2000-10-11
Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.
Configuring a Graphical User Interface for Managing Local HYSPLIT Model Runs Through AWIPS
NASA Technical Reports Server (NTRS)
Wheeler, mark M.; Blottman, Peter F.; Sharp, David W.; Hoeth, Brian; VanSpeybroeck, Kurt M.
2009-01-01
Responding to incidents involving the release of harmful airborne pollutants is a continual challenge for Weather Forecast Offices in the National Weather Service. When such incidents occur, current protocol recommends forecaster-initiated requests of NOAA's Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model output through the National Centers of Environmental Prediction to obtain critical dispersion guidance. Individual requests are submitted manually through a secured web site, with desired multiple requests submitted in sequence, for the purpose of obtaining useful trajectory and concentration forecasts associated with the significant release of harmful chemical gases, radiation, wildfire smoke, etc., into local the atmosphere. To help manage the local HYSPLIT for both routine and emergency use, a graphical user interface was designed for operational efficiency. The interface allows forecasters to quickly determine the current HYSPLIT configuration for the list of predefined sites (e.g., fixed sites and floating sites), and to make any necessary adjustments to key parameters such as Input Model. Number of Forecast Hours, etc. When using the interface, forecasters will obtain desired output more confidently and without the danger of corrupting essential configuration files.
2010 Nevada National Security Site Annual Illness and Injury Surveillance Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
U.S. Department of Energy, Office of Health, Safety and Health, Office of Health and Safety, Office of Illness and Injury Prevention Programs
2011-07-28
The U.S. Department of Energy's (DOE) commitment to assuring the health and safety of its workers includes the conduct of illness and injury surveillance activities that provide an early warning system to detect health problems among workers. The Illness and Injury Surveillance Program monitors illnesses and health conditions that result in an absence, occupational injuries and illnesses, and disabilities and deaths among current workers.
2016-03-14
DoD Department of Defense EMI electromagnetic induction ESTCP Environmental Security Technology Certification Program ft. foot GPS global...three primary objectives: Test and validate detection and discrimination capabilities of a currently available advanced electromagnetic induction ... induction (EMI) sensors in dynamic and static data acquisition modes and associated analysis software. To achieve these objectives, a controlled test was
HomeFront Strong (HFS): Building Resiliency in Military Families
2016-09-01
2. Train community providers to disseminate HomeFront Strong at their community sites; and 3. Evaluate the mental health outcomes of Group vs. Web...in each of these areas. 15. SUBJECT TERMS Military spouses; Resilience; Psychology health intervention; Mental health 16. SECURITY CLASSIFICATION... mental health outcomes of Group vs. Web-based HFS in a sample of 360 military and veteran spouses/partners and their children. The current proposal
Report #15-P-0013, November 10, 2014. Continued security breaches at some sites could impair the effectiveness of the remedy to protect human health and the environment and could expose trespassers to safety or health risks.
Utilizing Regional Centers in Sustaining Upgraded Russian Federation Ministry of Defense Sites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kaldenbach, Karen Yvonne; Chainikov, General Vladimir; Fedorov, General Victor
2010-01-01
Since the mid-1990s the governments of the United States (U.S.) and the Russian Federation (RF) have been collaborating on nonproliferation projects, particularly in the protection of nuclear material through the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). To date, this collaboration has resulted in upgrades to more than 72 RF Ministry of Defense (MOD) sensitive sites and facilities. These upgrades include physical protection systems (PPS), facilities to ensure material remains secure in various configurations, and infrastructure to support, maintain, and sustain upgraded sites. Significant effort on the part of both governments has also been expended to ensure thatmore » personnel obtain the necessary skills and training to both operate and maintain the security systems, thereby ensuring long term sustainability. To accomplish this, initial vendor training on physical protection systems was provided to key personnel, and an approved training curriculum was developed to teach the skills of operating, managing, administering, and maintaining the installed physical protection systems. This approach also included documentation of the processes and procedures to support infrastructure, requisite levels of maintenance and testing of systems and equipment, lifecycle management support, inventory systems and spare parts caches. One of the core components in the U.S. exit strategy and full transition to the RF MOD is the development and utilization of regional centers to facilitate centralized training and technical support to upgraded MOD sites in five regions of the RF. To date, two regional centers and one regional classroom facility are functional, and two additional regional centers are currently under construction. This paper will address the process and logistics of regional center establishment and the future vision for integrated regional center support by the RF MOD.« less
Security & Privacy Policy - Naval Oceanography Portal
Notice: This is a U.S. Government Web Site 1. This is a World Wide Web site for official information information on this Web site are strictly prohibited and may be punishable under the Computer Fraud and Abuse Information Act (FOIA) | External Link Disclaimer This is an official U.S. Navy web site. Security &
12 CFR 220.12 - Supplement: margin requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... current market value of the security or the percentage set by the regulatory authority where the trade... security, except for a non-equity security: (1) 150 percent of the current market value of the security; or (2) 100 percent of the current market value if a security exchangeable or convertible within 90...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-22
..., Including On-Site Leased Workers From Westaff, Supply Technologies, Aerotek, Securitas Security Services..., 2011 to include on-site leased workers from Supply Technologies, Aerotek and Securitas Security Services. The notice was published in the Federal Register on December 13, 2010 (75 FR 77666) and February...
Transformative Rendering of Internet Resources
2012-10-01
4 Securing WiFi Connections...comes from legitimate web sites that have themselves been hacked . There is no way of anticipating which of these sites have been hacked and therefore...pose a security threat to visitors. The purpose of most of this web page hacking is to plant malicious code on the web site that will attack any
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2014 CFR
2014-07-01
... must follow. These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Fiscal Service provides agents...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...
31 CFR 321.22 - Forwarding securities not payable by an agent.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... These instructions are available from a TRS Site or online at www.treasurydirect.gov. [77 FR 16167, Mar... TRS Site. The requests for payment on the securities should be properly certified. Any documentary... TRS Site in accordance with the rules in this part. The Bureau of the Public Debt provides agents with...
Building Security into Schools.
ERIC Educational Resources Information Center
Kosar, John E.; Ahmed, Faruq
2000-01-01
Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…
49 CFR 40.223 - What steps must be taken to protect the security of alcohol testing sites?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 1 2010-10-01 2010-10-01 false What steps must be taken to protect the security of alcohol testing sites? 40.223 Section 40.223 Transportation Office of the Secretary of..., Equipment and Supplies Used in Alcohol Testing § 40.223 What steps must be taken to protect the security of...
You, Wei-Bin; He, Dong-Jin; Qin, De-Hua; Ji, Zhi-Rong; Wu, Li-Yun; Yu, Jian-An; Chen, Bing-Rong; Tan, Yong
2014-05-01
This paper proposed a new concept of ecological security for protection by a comprehensive analysis of the contents and standards of world heritage sites. A frame concept model named "Pressure-State-Control" for early warning of ecological security at world heritage mixed sites was constructed and evaluation indicators of this frame were also selected. Wuyishan Scenery District was chosen for a case study, which has been severely disturbed by natural and artificial factors. Based on the frame model of "Pressure-State-Control" and by employing extension analysis, the matter-element model was established to assess the ecological security status of this cultural and natural world heritage mixed site. The results showed that the accuracy of ecological security early warning reached 84%. Early warning rank was I level (no alert status) in 1997 and 2009, but that in 2009 had a higher possibility to convert into II level. Likewise, the early-warning indices of sensitive ranks were different between 1997 and 2009. Population density, population growth rate, area index for tea garden, cultivated land owned per capita, level of drought, and investment for ecological and environmental construction were the main limiting factors to hinder the development of ecological security from 2009 to future. In general, the status of Wuyishan Scenery District ecological security was relatively good and considered as no alert level, while risk conditions also existed in terms of a few early-warning indicators. We still need to pay more attention to serious alert indicators and adopt effective prevention and control measures to maintain a good ecological security status of this heritage site.
The design and implementation of web mining in web sites security
NASA Astrophysics Data System (ADS)
Li, Jian; Zhang, Guo-Yin; Gu, Guo-Chang; Li, Jian-Li
2003-06-01
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information, so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Robert C.; Drollinger, Harold; Bullard, Thomas F.
2013-01-01
This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase,more » Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Roberrt C.; Drollinger, Harold
2013-06-01
This report presents a historical evaluation of the U16a Tunnel on the Nevada National Security Site in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office and the U.S. Department of Defense, Defense Threat Reduction Agency. The U16a Tunnel was used for underground nuclear weapons effects tests in Shoshone Mountain in Area 16 of the Nevada National Security Site. Six nuclear tests were conducted in the U16a Tunnel from 1962 to 1971. These tests are Marshmallow, Gum Drop, Double Play, Ming Vase,more » Diamond Dust, and Diamond Mine. The U.S. Department of Defense Threat Reduction Agency, with participation from Lawrence Livermore National Laboratory and Las Alamos National Laboratory, sponsored the tests. Fifteen high explosives tests were also conducted at the tunnel. Two were calibration tests during nuclear testing and the remaining were U.S. Department of Defense, Defense Threat Reduction Agency tunnel defeat tests. The U16a Tunnel complex is on the top and slopes of Shoshone Mountain, encompassing an area of approximately 16.7 hectares (41.1 acres). Major modifications to the landscape are a result of three principal activities, road construction and maintenance, mining activities related to development of the tunnel complex, and site preparation for activities related to testing. Forty-seven cultural features were recorded at the portal and on the slopes of Shoshone Mountain. At the portal area, features relate to the mining, construction, testing, and general every day operational support activities within the tunnel. These include concrete foundations for buildings, equipment pads, and rail lines. Features on the slopes above the tunnel relate to tunnel ventilation, borehole drilling, and data recording. Feature types include soil-covered bunkers, concrete foundations, instrument cable holes, drill holes, and ventilation shafts. The U16a Tunnel complex is eligible to the National Register of Historic Places under criteria a and c, consideration g of 36 CFR Part 60.4 as a historic landscape. Scientific research conducted at the tunnel has made significant contributions to the broad patterns of our history, particularly in regard to the Cold War era that was characterized by competing social, economic, and political ideologies between the former Soviet Union and the United States. The tunnel also possesses distinctive construction and engineering methods for conducting underground nuclear tests. The Desert Research Institute recommends that the U16a Tunnel area be left in place in its current condition and that the U16a Tunnel historic landscape be included in the Nevada National Security Site monitoring program and monitored on a regular basis.« less
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
17 CFR 232.314 - Accommodation for certain securitizers of asset-backed securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities Rulemaking Board's Internet Web site. [76 FR 4511, Jan. 26, 2011] XBRL-Related Documents ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Accommodation for certain securitizers of asset-backed securities. 232.314 Section 232.314 Commodity and Securities Exchanges SECURITIES...
Chemical plants remain vulnerable to terrorists: a call to action.
Lippin, Tobi Mae; McQuiston, Thomas H; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L; Howard, Donna; Seymour, Thomas A; Stephens, Doug; Williams, Brian K
2006-09-01
U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation's security are as follows: a) specify detailed requirements for chemical site assessment and security ; b) mandate audit inspections supported by significant penalties for cases of noncompliance ; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals ; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation ; e) mandate and fund the upgrading of emergency communication systems ; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident.
Chemical Plants Remain Vulnerable to Terrorists: A Call to Action
Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.
2006-01-01
U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080
Industrial Sites - An Approach to Closure
None
2018-01-16
The Environmental Management (EM) Program at the Nevada Site Office was created by the U.S. Department of Energy (DOE) to address the environmental legacy of contamination resulting from more than 50 years of nuclear weapons research, production and testing. The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NSO) is responsible for remediating portions of the Nevada National Security Site (formerly the Nevada Test Site) and the Tonopah Test Range, which is within the Nevada Test and Training Range.
Nevada National Security Site Environmental Report 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy Wills, ed
2012-09-12
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
A review of security of electronic health records.
Win, Khin Than
The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.
77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725
1989-09-27
a run is always the @RUN statement, which can specify user-id, account number, and project-id. The @ PASSWD statement specifies password and security...Every-Page-Label Options PASSWD password for batch; F36 User-id validation chang for demand; comp, nent set for batch LEV change Clearance Level F33...clearance level @@PASS Change password F36 Current valid password must @@ PASSWD be specified @@SEND Display a print file F16 Sym to user-id or site-id that is
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-26
... From OMB of One Current Public Collection of Information: Pipeline Corporate Security Review Program... current security practices in the pipeline industry by way of TSA's Pipeline Corporate Security Review... Collection Requirement The TSA Pipeline Security Branch is responsible for conducting Pipeline Corporate...
6 CFR 27.210 - Submissions schedule.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in any subsequent Federal Register notice. (2) Security Vulnerability Assessment. Unless otherwise notified, a covered facility must complete and submit a Security Vulnerability Assessment within 90... Department's approval of the facility's Site Security Plan. (2) Security Vulnerability Assessment. Unless...
Use of Emerging Grid Computing Technologies for the Analysis of LIGO Data
NASA Astrophysics Data System (ADS)
Koranda, Scott
2004-03-01
The LIGO Scientific Collaboration (LSC) today faces the challenge of enabling analysis of terabytes of LIGO data by hundreds of scientists from institutions all around the world. To meet this challenge the LSC is developing tools, infrastructure, applications, and expertise leveraging Grid Computing technologies available today, and making available to LSC scientists compute resources at sites across the United States and Europe. We use digital credentials for strong and secure authentication and authorization to compute resources and data. Building on top of products from the Globus project for high-speed data transfer and information discovery we have created the Lightweight Data Replicator (LDR) to securely and robustly replicate data to resource sites. We have deployed at our computing sites the Virtual Data Toolkit (VDT) Server and Client packages, developed in collaboration with our partners in the GriPhyN and iVDGL projects, providing uniform access to distributed resources for users and their applications. Taken together these Grid Computing technologies and infrastructure have formed the LSC DataGrid--a coherent and uniform environment across two continents for the analysis of gravitational-wave detector data. Much work, however, remains in order to scale current analyses and recent lessons learned need to be integrated into the next generation of Grid middleware.
Secure web-based access to radiology: forms and databases for fast queries
NASA Astrophysics Data System (ADS)
McColl, Roderick W.; Lane, Thomas J.
2002-05-01
Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-03-01
This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately,more » develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alfred J. Karns
This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (No. NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume andmore » toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Management
This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year (CY) 2007. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit (number NEV HW0021), and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the U.S. Department of Energy, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process tomore » reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Restoration
This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC, for the U. S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during calendar year 2009. This report was developed in accordance with the requirements of the Nevada Test Site Resource Conservation and Recovery Act Permit (No. NEV HW0021), and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the U.S. Department of Energy, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volumemore » and toxicity of waste generated by NNSA/NSO activities and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by NNSA/NSO.« less
Kwan, Christine Ml; Napoles, Anna M; Chou, Jeyling; Seligman, Hilary K
2015-02-01
To develop a conceptually equivalent Chinese-language translation of the eighteen-item US Household Food Security Survey Module. In the current qualitative study, we (i) highlight methodological challenges which arise in developing survey instruments that will be used to make comparisons across language groups and (ii) describe the development of a Chinese-language translation of the US Household Food Security Survey Module, called the San Francisco Chinese Food Security Module. Community sites in San Francisco, CA, USA. We conducted cognitive interviews with twenty-two community members recruited from community sites hosting food pantries and with five professionals recruited from clinical settings. Development of conceptually equivalent surveys can be difficult. We highlight challenges related to dialect, education, literacy (e.g. preferences for more or less formal phrasing), English words and phrases for which there is no Chinese language equivalent (e.g. 'balanced meals' and 'eat less than you felt you should') and response formats. We selected final translations to maximize: (i) consistency of the Chinese translation with the intent of the English version; (ii) clarity; and (iii) similarities in understanding across dialects and literacy levels. Survey translation is essential for conducting research in many communities. The challenges encountered illustrate how literal translations can affect the conceptual equivalence of survey items across languages. Cognitive interview methods should be routinely used for survey translation when such non-equivalence is suspected, such as in surveys addressing highly culturally bound behaviours such as diet and eating behaviours. Literally translated surveys lacking conceptual equivalence may magnify or obscure important health inequalities.
Quantum network with trusted and untrusted relays
NASA Astrophysics Data System (ADS)
Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen
2012-02-01
Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.
[Current state of measures to deal with natural disasters at public universities].
Hirouchi, Tomoko; Tanka, Mamoru; Shimada, Ikuko; Yoshimoto, Yoshinobu; Sato, Atsushi
2012-03-01
The responsibility of a university after a large-scale, natural disaster is to secure the safety of students' and local residents' lives. The present study investigated the current state of measures at public universities to deal with natural disasters in coordination with the local community. A survey was administered at 77 public universities in Japan from March 25 to May 10, 2011. The survey included questions on the existence of local disaster evacuation sites, a disaster manual, disaster equipment storage, emergency drinking water, and food storage. A total of 51% of universities had designated local evacuation sites. Based on responses for the remaining questions, universities with and without the designated disaster response solutions accounted for 42% and 57%, respectively, for disaster manuals; 55% and 33%, respectively, for disaster equipment; 32% and 13%, respectively, for disaster drinking water storage; and 26% and 7%, respectively, for emergency food storage. A majority of public universities have not created disaster manuals, regardless of whether they have a local evacuation site. The survey results also indicated that most universities have no storage of disaster equipment or emergency supplies.
Downgrade of the Savannah River Sites FB-Line
DOE Office of Scientific and Technical Information (OSTI.GOV)
SADOWSKI, ED; YOURCHAK, RANDY; PRETZELLO MARJI
2005-07-05
This paper will discuss the Safeguards & Security (S&S) activities that resulted in the downgrade of the Savannah River Site's FB-Line (FBL) from a Category I Material Balance Area (MBA) in a Material Access Area (MAA) to a Category IV MBA in a Property Protection Area (PPA). The Safeguards activities included measurement of final product items, transferal of nuclear material to other Savannah River Site (SRS) facilities, discard of excess nuclear material items, and final measurements of holdup material. The Security activities included relocation and destruction of classified documents and repositories, decertification of a classified computer, access control changes, updatesmore » to planning documents, deactivation and removal of security systems, Human Reliability Program (HRP) removals, and information security training for personnel that will remain in the FBL PPA.« less
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
Retail E-Commerce Security Status among Fortune 500 Corporations
ERIC Educational Resources Information Center
Zhao, Jensen J.; Zhao, Sherry Y.
2012-01-01
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
NASA Astrophysics Data System (ADS)
Rehan, S. C.
This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.
SecureMA: protecting participant privacy in genetic association meta-analysis.
Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A
2014-12-01
Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon, S.
During the period from fiscal year (FY) 2009 to FY 2011, there were a total of 21 incidents involving radioactively contaminated shipment trailers and 9 contaminated waste packages received at the Nevada National Security Site (NNSS) Area 5 Radioactive Waste Management Site (RWMS). During this time period, the EnergySolutions (ES) Clive, Utah, disposal facility had a total of 18 similar incidents involving trailer and package contamination issues. As a result of the increased occurrence of such incidents, DOE Environmental Management Headquarters (EM/HQ) Waste Management organization (EM-30) requested that the Energy Facility Contractors’ Group (EFCOG) Waste Management Working Group (WMWG) conductmore » a detailed review of these incidents and report back to EM-30 regarding the results of this review, including providing any recommendations formulated as a result of the evaluation of current site practices involving handling and management of radioactive material and waste shipments.« less
6 CFR 27.255 - Recordkeeping requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... audit required under § 27.225(e)) or Security Vulnerability Assessment, a record of the audit, including... retain records of submitted Top-Screens, Security Vulnerability Assessments, Site Security Plans, and all...
Nevada Test Site Environmental Report 2008
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cathy A. Wills
2009-09-01
The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.
Securing your Site in Development and Beyond
DOE Office of Scientific and Technical Information (OSTI.GOV)
Akopov, Mikhail S.
Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...
DOT National Transportation Integrated Search
2016-07-01
This document provides guidance material in regards to security for the CV Pilots Deployment Concept Development Phase. An approach for developing the security operational concept is presented based on identifying the impacts of security breaches reg...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... meet the following standards: (1) Address each vulnerability identified in the facility's Security Vulnerability Assessment, and identify and describe the security measures to address each such vulnerability; (2... updates, revises or otherwise alters its Security Vulnerability Assessment pursuant to § 27.215(d), the...
6 CFR 27.235 - Alternative security program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1... Tier 3 facilities may not submit an ASP in lieu of a Security Vulnerability Assessment. (b) The... Security Vulnerability Assessment or using the procedure specified in § 27.245 if the ASP is intended to...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...
The Arab Citizens of Israel: Motivations for Collective Action
2008-03-01
46 Jewish National Fund, “Tree Planting Center,” https://secure2.convio.net/jnf/site/ Ecommerce ?store_id=3181...2008]. ———, “Tree Planting Center,” available at https://secure2.convio.net/jnf/site/ Ecommerce ?store_id=3181&VIEW_HOMEPA GE=true
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF THE INTERIOR OFFSHORE OIL AND GAS AND SULPHUR OPERATIONS IN THE OUTER CONTINENTAL SHELF Sulphur Operations § 250.1634 Site security. (a) All locations... Regional Supervisor as soon as possible but no later than the next business day after discovery of the...
Secure Web-Site Access with Tickets and Message-Dependent Digests
Donato, David I.
2008-01-01
Although there are various methods for restricting access to documents stored on a World Wide Web (WWW) site (a Web site), none of the widely used methods is completely suitable for restricting access to Web applications hosted on an otherwise publicly accessible Web site. A new technique, however, provides a mix of features well suited for restricting Web-site or Web-application access to authorized users, including the following: secure user authentication, tamper-resistant sessions, simple access to user state variables by server-side applications, and clean session terminations. This technique, called message-dependent digests with tickets, or MDDT, maintains secure user sessions by passing single-use nonces (tickets) and message-dependent digests of user credentials back and forth between client and server. Appendix 2 provides a working implementation of MDDT with PHP server-side code and JavaScript client-side code.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Management
2011-03-01
The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 Radioactive Waste Management Site (RWMS) Performance Assessments (PAs) and Composite Analyses (CAs) in fiscal year (FY) 2010. This annual summary report presents data and conclusions from the FY 2010 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at themore » Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs.« less
What users want in e-commerce design: effects of age, education and income.
Lightner, Nancy J
2003-01-15
Preferences for certain characteristics of an online shopping experience may be related to demographic data. This paper discusses the characteristics of that experience, demographic data and preferences by demographic group. The results of an online survey of 488 individuals in the United States indicate that respondents are generally satisfied with their online shopping experiences, with security, information quality and information quantity ranking first in importance overall. The sensory impact of a site ranked last overall of the seven characteristics measured. Preferences for these characteristics in e-commerce sites were differentiated by age, education and income. The sensory impact of sites became less important as respondents increased in age, income or education. As the income of respondents increased, the importance of the reputation of the vendor rose. Web site designers may incorporate these findings into the design of e-commerce sites in an attempt to increase the shopping satisfaction of their users. Results from the customer relationship management portion of the survey suggest that current push technologies and site personalization are not an effective means of achieving user satisfaction.
Baird, Theodore
2017-06-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.
Baird, Theodore
2017-01-01
This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-22
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2002-11602] Intent to Request Renewal From OMB of One Current Public Collection of Information: Security Programs for..., Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6011. FOR FURTHER INFORMATION...
75 FR 1552 - Chemical Facility Anti-Terrorism Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... Protection Agency RMP--Risk Management Program SSP--Site Security Plan STQ--Screening Threshold Quantity SVA... Protection Agency (EPA) under the Clean Air Act's Risk Management Program (RMP) for counting-- or excluding... Safety, Information, Site Security and Fuels Regulatory Relief Act, Public Law 106-40. Cf. 72 FR 65410...
78 FR 29147 - Federal Property Suitable as Facilities To Assist the Homeless
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
...: Excess Comments: off-site removal only; 9,822 sf.; BDE HQ; repairs needed; asbestos; secured area....; Admin.; repairs needed; asbestos; secured area; contact Army for access/removal requirements Building...: Excess Comments: off-site removal only; 15,484 sf.; Admin.; 4 months vacant; repairs needed; asbestos...
Information Badging Information Foreign National Requirements SLAC Internal Gate Information Site Entry Form this is a SLAC-Internal page for videos on how to use the automated gates. Security Assistance The Main and holidays. See Gate Information this is a SLAC-Internal page for more information about the
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... site security? You must: (1) Protect Federal production against production loss or theft; (2) Post a... Regional Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft...) All valves on lines leaving a royalty or inventory storage tank, including load-out line valves, drain...
Based on the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA), this notice states that while you may share with the public data from OCA sections, it is illegal to disclose/distribute the sections themselves.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Code of Federal Regulations, 2013 CFR
2013-04-01
... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...
Perceived Security Determinants in E-Commerce among Turkish University Students
ERIC Educational Resources Information Center
Yenisey, M.M.; Ozok, A.A.; Salvendy, G.
2005-01-01
Perceived security is defined as the level of security that users feel while they are shopping on e-commerce sites. The aims of this study were to determine items that positively influence this feeling of security by users during shopping, and to develop guidelines for perceived security in e-commerce. An experiment allowed users with different…
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
10 CFR 1046.14 - Access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorization for the highest level of classified matter to which they potentially have access. Security police... by the site security organization and approved by the Head of the Field Element. Security police officers shall possess a minimum of an “L” or DOE Secret access authorization. Security police officers...
NASA Astrophysics Data System (ADS)
Francisco, Glen; Brown, Todd
2012-06-01
Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.
Wildlife on the Nevada National Security Site
Longshore, Kathleen M.; Wessells, Stephen M.
2017-09-05
Mountain lions, desert bighorn sheep, mule deer, and a variety of other wildlife live on and pass through the Nevada National Security Site each day. It is a highly restricted area that is free of hunting and has surprisingly pristine areas. This 22-minute program highlights an extraordinary study on how mountain lions interact with their prey. It shows how the scientists use helicopters and classical lion tracking to check on these animals' health, follow their movements, and fit them with GPS collars. Results from this work provide impressive insight into how these animals survive. The video is also available at the following YouTube link: Wildlife on the Nevada National Security Site.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mark Krauss and Catherine Birney
2011-05-01
This Closure Report (CR) presents information supporting the closure of Corrective Action Unit (CAU) 544: Cellars, Mud Pits, and Oil Spills, Nevada National Security Site, Nevada. This CR complies with the requirements of the Federal Facility Agreement and Consent Order that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The corrective action sites (CASs) within CAU 544 are located within Areas 2, 7, 9, 10, 12, 19, and 20 of the Nevada National Security Site. Corrective Action Unit 544 comprises the following CASs: • 02-37-08,more » Cellar & Mud Pit • 02-37-09, Cellar & Mud Pit • 07-09-01, Mud Pit • 09-09-46, U-9itsx20 PS #1A Mud Pit • 10-09-01, Mud Pit • 12-09-03, Mud Pit • 19-09-01, Mud Pits (2) • 19-09-03, Mud Pit • 19-09-04, Mud Pit • 19-25-01, Oil Spill • 19-99-06, Waste Spill • 20-09-01, Mud Pits (2) • 20-09-02, Mud Pit • 20-09-03, Mud Pit • 20-09-04, Mud Pits (2) • 20-09-06, Mud Pit • 20-09-07, Mud Pit • 20-09-10, Mud Pit • 20-25-04, Oil Spills • 20-25-05, Oil Spills The purpose of this CR is to provide documentation supporting the completed corrective actions and data confirming that the closure objectives for CASs within CAU 544 were met. To achieve this, the following actions were performed: • Review the current site conditions, including the concentration and extent of contamination. • Implement any corrective actions necessary to protect human health and the environment. • Properly dispose of corrective action and investigation wastes. • Document Notice of Completion and closure of CAU 544 issued by the Nevada Division of Environmental Protection.« less
Kwan, Christine ML; Napoles, Anna M; Chou, Jeyling; Seligman, Hilary K
2014-01-01
Objective To develop a conceptually equivalent Chinese-language translation of the eighteen-item US Household Food Security Survey Module. Design In the current qualitative study, we (i) highlight methodological challenges which arise in developing survey instruments that will be used to make comparisons across language groups and (ii) describe the development of a Chinese-language translation of the US Household Food Security Survey Module, called the San Francisco Chinese Food Security Module. Setting Community sites in San Francisco, CA, USA. Subjects We conducted cognitive interviews with twenty-two community members recruited from community sites hosting food pantries and with five professionals recruited from clinical settings. Results Development of conceptually equivalent surveys can be difficult. We highlight challenges related to dialect, education, literacy (e.g. preferences for more or less formal phrasing), English words and phrases for which there is no Chinese language equivalent (e.g. ‘balanced meals’ and ‘eat less than you felt you should’) and response formats. We selected final translations to maximize: (i) consistency of the Chinese translation with the intent of the English version; (ii) clarity; and (iii) similarities in understanding across dialects and literacy levels. Conclusions Survey translation is essential for conducting research in many communities. The challenges encountered illustrate how literal translations can affect the conceptual equivalence of survey items across languages. Cognitive interview methods should be routinely used for survey translation when such non-equivalence is suspected, such as in surveys addressing highly culturally bound behaviours such as diet and eating behaviours. Literally translated surveys lacking conceptual equivalence may magnify or obscure important health inequalities. PMID:24642365
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
BALKANS SECURITY. Current and Projected Factors Affecting Regional Stability
2000-04-01
Security Briefing Section II Current Situation in Kosovo and Bosnia primary responsibility for public security in Kosovo. 6 According to a senior KFOR...Integrity * Reliability GAO/NSIAD-00-125BR „.c-miBUTION STATEMENT A ApSwed for Public Release Contents Letter Briefing Section Appendixes Tables...Figures Briefing Section I: Background Briefing Section II: Current Situation in Kosovo and Bosnia Briefing Section III: Projected Security Situation
"It's Like Moving the Titanic:" Community Organizing to Address Food (In)Security.
Okamoto, Kristen E
2017-08-01
Health communication scholars are uniquely positioned to examine the ways in which individuals organize to address current and future exigencies related to social ills. In particular, organizations are key sites in understanding our health decisions related to food choice. From a young age, children develop habits of eating that stay with them throughout their life. More specifically, food insecurity impacts childhood nutrition. Children from low-income homes experience disproportional negative health outcomes. Appalachian Ohio is an area within the United States that experiences severe poverty. In 2013, community members in a small public school district in Appalachian Ohio formed the Appalachian Nutrition Advisory Council to address the nutritional needs of students in schools. This project stories the ways in which community members creatively organized to supplement existing structures in place designed to address school nutrition and food security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Gregory S.; Nickless, William K.; Thiede, David R.
Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease ofmore » development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.« less
Community archiving of imaging studies
NASA Astrophysics Data System (ADS)
Fritz, Steven L.; Roys, Steven R.; Munjal, Sunita
1996-05-01
The quantity of image data created in a large radiology practice has long been a challenge for available archiving technology. Traditional methods ofarchiving the large quantity of films generated in radiology have relied on warehousing in remote sites, with courier delivery of film files for historical comparisons. A digital community archive, accessible via a wide area network, represents a feasible solution to the problem of archiving digital images from a busy practice. In addition, it affords a physician caring for a patient access to imaging studies performed at a variety ofhealthcare institutions without the need to repeat studies. Security problems include both network security issues in the WAN environment and access control for patient, physician and imaging center. The key obstacle to developing a community archive is currently political. Reluctance to participate in a community archive can be reduced by appropriate design of the access mechanisms.
Perception of personal safety in urban recreation sites
Herbert W. Schroeder; L.M. Anderson
1984-01-01
Photograph of 17 urban recreation sites in Chicago and Atlanta were evaluated by college students (n = 68) in Illinois, Georgia, and Michigan, for either perceived security, scenic quality, or both. For most raters, high visibility and developed park features significantly enhanced perceived security. Scenic quality, on the other hand, was enhanced for the majority of...
76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-17
... during site visits with security and operating officials of transit systems. The STSIs capture and... assessments during site visits with security and operating officials of transit agencies. DATES: Send your... distance passenger railroad providers operate in the United States.\\1\\ Mass transit and passenger rail...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2014-05-01
Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate andmore » recommend corrective action alternatives.« less
Code of Federal Regulations, 2013 CFR
2013-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Code of Federal Regulations, 2012 CFR
2012-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
Code of Federal Regulations, 2014 CFR
2014-10-01
... requirements shall include the following components: (i) Determination and implementation of appropriate... use; (C) Software and data security; (D) Telecommunications security; (E) Personnel security; (F... reviews, together with pertinent supporting documentation, for HHS on-site review. [43 FR 44853, Sept. 29...
2014-09-01
biometrics technologies. 14. SUBJECT TERMS Facial recognition, systems engineering, live video streaming, security cameras, national security ...national security by sharing biometric facial recognition data in real-time utilizing infrastructures currently in place. It should be noted that the...9/11),law enforcement (LE) and Intelligence community (IC)authorities responsible for protecting citizens from threats against national security
Ecological Monitoring and Compliance Program 2013 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Anderson, David C.; Greger, Paul D.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2013. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2013, allmore » applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2011 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, D. J.; Anderson, D. C.; Hall, D. B.
The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, monitors the ecosystem of the Nevada National Security Site and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program's activities conducted by National Security Technologies, LLC, during calendar year 2011. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test and Evaluation Complex. Duringmore » 2011, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farnham, Irene
This Closure Report (CR) has been prepared for Corrective Action Unit (CAU) 98, Frenchman Flat, Nevada National Security Site (NNSS), Nevada. The Frenchman Flat CAU was the site of 10 underground nuclear tests, some of which have impacted groundwater near the tests. This work was performed as part of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity in accordance with the Federal Facility Agreement and Consent Order (FFACO). This CR describes the selected corrective action to be implemented during closure to protect human health and the environment from the impactedmore » groundwater« less
DOE's Computer Incident Advisory Capability (CIAC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schultz, E.
1990-09-01
Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less
The HEPiX Virtualisation Working Group: Towards a Grid of Clouds
NASA Astrophysics Data System (ADS)
Cass, Tony
2012-12-01
The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.
Weber, Roland; Gaus, Caroline; Tysklind, Mats; Johnston, Paul; Forter, Martin; Hollert, Henner; Heinisch, Emanuel; Holoubek, Ivan; Lloyd-Smith, Mariann; Masunaga, Shigeki; Moccarelli, Paolo; Santillo, David; Seike, Nobuyasu; Symons, Robert; Torres, Joao Paulo Machado; Verta, Matti; Varbelow, Gerd; Vijgen, John; Watson, Alan; Costner, Pat; Woelz, Jan; Wycisk, Peter; Zennegg, Markus
2008-07-01
Once they have been generated, polychlorinated dibenzo-p-dioxins (PCDDs) and dibenzofurans (PCDFs) and other persistent organic pollutants (POPs) can persist in soils and sediments and in waste repositories for periods extending from decades to centuries. In 1994, the US EPA concluded that contaminated sites and other reservoirs are likely to become the major source of contemporary pollution problems with these substances. With this in mind, this article is the first in a new series in ESPR under the title 'Case Studies on Dioxin and POP Contaminated Sites--Contemporary and Future Relevance and Challenges', which will address this important issue. The series will document various experiences from sites contaminated with PCDD/F and other POPs. This article provides an overview of the content of the articles comprising the series. In addition, it provides a review of the subject in its own right and identifies the key issues arising from dioxin/POP-contaminated sites. Additionally, it highlights the important conclusions that can be drawn from these examples. The key aim of this article and of the series as a whole is to provide a comprehensive overview of the types of PCDD/F contaminated sites that exist as a result of historical activities. It details the various processes whereby these sites became contaminated and attempts to evaluate their contemporary relevance as sources of PCDD/Fs and other POPs. It also details the various strategies used to assess these historical legacies of contamination and the concepts developed, or which are under development, to effect their remediation. Special sessions on 'Contaminated sites--Cases, remediation, risk and policy' were held at the DIOXIN conferences in 2006 and 2007, and this theme will be continued at DIOXIN 2008 to be held in Birmingham. Selected cases from the approximately 70 contributions made to these sessions, together with some additional invited case studies are outlined together with the key issues they raise. By evaluating these cases and adding details of experiences published in the current literature, an overview will be given of the different features and challenges of dioxin and POP-contaminated sites. This article provides a systematic categorisation of types of PCDD/F and POP-contaminated sites. These are categorised according to the chemical or manufacturing process, which generated the PCDD/Fs or POPs and also includes the use and disposal aspects of the product life cycle in question. The highest historical PCDD/F and dioxin-like polychlorinated biphenyl (PCB) contamination burdens have arisen as a result of the production of chlorine and of chlorinated organic chemicals. In particular, the production of chlorinated pesticides, PCBs and the related contaminated waste streams are identified being responsible for historical releases of toxic equivalents (TEQs) at a scale of many tonnes. Along with such releases, major PCDD/F contaminated sites have been created through the application or improper disposal of contaminated pesticides, PCBs and other organochlorine chemicals, as well through the recycling of wastes and their attempted destruction. In some extreme examples, PCDD/F contaminated sites have also resulted from thermal processes such as waste incinerators, secondary metal industries or from the recycling or deposition of specific waste (e.g. electronic waste or car shredder wastes), which often contain chlorinated or brominated organic chemicals. The examples of PCDD/F and dioxin-like PCB contamination of fish in European rivers or the impact of contaminated sites upon fishing grounds and upon other food resources demonstrate the relevance of these historical problems to current and future human generations. Many of the recent food contamination problems that have emerged in Europe and elsewhere demonstrate how PCDD/F and dioxin like PCBs from historical sources can directly contaminate human and animal feedstuffs and indeed highlight their considerable contemporary relevance in this respect. Accordingly, some key experiences and lessons learnt regarding the production, use, disposal and remediation of POPs from the contaminated sites are summarised. An important criterion for evaluating the significance and risks of PCDD/Fs and other POPs at contaminated sites is their present or future potential for mobility. This, in turn, determines to a large degree their propensity for off-site transport and environmental accessibility. The detailed evaluation of contaminated site cases reveals different site-specific factors, which influence the varied pathways through which poor water-soluble POPs can be mobilised. Co-contaminants with greater water solubility are also typically present at such sites. Hence, pumping of groundwater (pump and treat) is often required in addition to attempting to physically secure a site. At an increasing number of contaminated sites, securing measures are failing after relatively short time spans compared to the time horizon, which applies to persistent organic pollutant contamination. Due to the immense costs and challenges associated with remediation of contaminated sites 'monitored natural attenuation' is increasingly gaining purchase as a conceptual remediation approach. However, these concepts may well prove limited in their practical application to contaminated sites containing persistent organic pollutants and other key pollutants like heavy metals. It is inevitable, therefore, that dioxin/POP-contaminated sites will remain of contemporary and future relevance. They will continue to represent an environmental issue for future generations to address. The securing and/or remediation of dioxin/POP-contaminated sites is very costly, generally in the order of tens or hundreds of millions of dollars. Secured landfills and secured production sites need to be considered as constructions not made for 'eternity' but built for a finite time scale. Accordingly, they will need to be controlled, supervised and potentially repaired/renewed. Furthermore, the leachates and groundwater impacted by these sites will require ongoing monitoring and potential further remediation. These activities result in high maintenance costs, which are accrued for decades or centuries and should, therefore, be compared to the fully sustainable option of complete remediation. The contaminated site case studies highlight that, while extensive policies and established funds for remediation exist in most of the industrialised western countries, even these relatively well-regulated and wealthy countries face significant challenges in the implementation of a remediation strategy. This highlights the fact that ultimately only the prevention of contaminated sites represents a sustainable solution for the future and that the Polluter Pays Principle needs to be applied in a comprehensive way to current problems and those which may emerge in the future. With the continuing shift of industrial activities in developing and transition economies, which often have poor regulation (and weak self-regulation of industries), additional global challenges regarding POPs and other contaminated sites may be expected. In this respect, a comprehensive application of the "polluter pays principle" in these countries will also be a key to facilitate the clean-up of contaminated areas and the prevention of future contaminated sites. The threats and challenges of contaminated sites and the high costs of securing/remediating the problems highlight the need for a comprehensive approach based upon integrated pollution prevention and control. If applied to all polluting (and potentially polluting) industrial sectors around the globe, such an approach will prove to be both the cheapest and most sustainable way to underpin the development of industries in developing and transition economies.
NASA Astrophysics Data System (ADS)
Blundo, Carlo; Cimato, Stelvio; Masucci, Barbara
The current trend on the Internet suggests that the majority of revenues of web sites come from the advertising potential of the World Wide Web. Advertising is arguably the type of commercial information exchange of the greatest economic importance in the real world. Indeed, advertising is what funds most other forms of information exchange, including radio stations, television stations, cable networks, magazines, and newspapers. According to the figures provided by the Internet Advertising Bureau [24] and Price Waterhouse Coopers [43], advertising revenue results for the first 9 months of 2004 totaled slightly over 7.0 billion dollars.
Education and Strategic Research Collaborations
Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student
Nevada National Security Site Industrial Sites Project Closeout - 12498
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cabble, Kevin; Krauss, Mark; Matthews, Pat
The U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office is responsible for environmental restoration (ER) at the Nevada National Security Site (NNSS). This includes remediation at Industrial Sites where past nuclear testing activities and activities that supported nuclear testing may have or are known to have resulted in the release of contaminants into the environment. Industrial Sites at the NNSS have included nuclear facilities that supported the nuclear rocket/missile development programs, gas stations, landfills, spill sites, ordnance sites, and numerous other waste disposal and release sites. The NNSS Industrial Sites activities neared completion at the endmore » of fiscal year 2011 while other activities required under the Federal Facility Agreement and Consent Order (FFACO) and part of the same NNSS ER Project are forecasted to extend to 2027 or beyond. With the majority of Industrial Sites corrective action units (CAUs) completed (more than 250 CAUs and over 1,800 corrective action sites), it was determined that an activity closeout process should be implemented to ensure that the work completed over the past 15 years is well documented in a comprehensive and concise summary. While the process used to close each individual CAU is described in approved documents, no single document describes in summary fashion the work completed to close the many individual Industrial Sites. The activity closeout process will be used to develop an Industrial Sites closeout document that describes these years of work. This document will summarize the number of Industrial Sites closed under the FFACO and provide general descriptions of projects, contaminants removed, and sites closed in place with corresponding Use Restrictions. Other pertinent information related to Industrial Sites work such as the project history, closure decisions, historical declarations, remediation strategies, and final CAU status will be included in the closeout document, along with a table listing each CAU and corresponding corrective action sites within each CAU. Using this process of conducting the activity closeout and developing a closeout document may prove useful for other ER projects within the DOE complex in describing how a long period of ER can be summarized in a single document. The NNSS Industrial Sites activities were completed over the span of 15 years and involved the investigation, cleanup or Use Restriction, and closure of more than 260 CAUs and over 1,800 sites. These activities will conclude in FY 2012 (with the exception of one CAU). In order to capture the work completed over this length of time and document decisions made during the activities, a closeout effort was initiated. The closeout will review the work conducted during the Industrial Sites activities and produce a single document that summarizes Industrial Sites activities. This closeout is being conducted at an interim stage in the overall NNSA/NSO ER Project since the Soils and UGTA activities will continue for a number of years, but the completion of the Industrial Sites project warrants conducting a closeout now while personnel are available and information is still current. The process followed by NNSA/NSO in conducing project closeout for the Industrial Sites portion of the ER program may prove useful within the DOE complex in demonstrating how a large ER project can be summarized. (authors)« less
Lund, Adam; Turris, Sheila
2017-08-01
Despite the best efforts of event producers and on-site medical teams, there are sometimes serious illnesses, life-threatening injuries, and fatalities related to music festival attendance. Producers, clinicians, and researchers are actively seeking ways to reduce the mortality and morbidity associated with these events. After analyzing the available literature on music festival health and safety, several major themes emerged. Principally, stakeholder groups planning in isolation from one another (ie, in silos) create fragmentation, gaps, and overlap in plans for major planned events (MPEs). The authors hypothesized that one approach to minimizing this fragmentation may be to create a framework to "connect the dots," or join together the many silos of professionals responsible for safety, security, health, and emergency planning at MPEs. Adapted from the well-established literature regarding the management of cardiac arrests, both in and out of hospital, the "chain of survival" concept is applied to the disparate groups providing services that support event safety in the context of music festivals. The authors propose this framework for describing, understanding, coordinating and planning around the integration of safety, security, health, and emergency service for events. The adapted Event Chain of Survival contains six interdependent links, including: (1) event producers; (2) police and security; (3) festival health; (4) on-site medical services; (5) ambulance services; and (6) off-site medical services. The authors argue that adapting and applying this framework in the context of MPEs in general, and music festivals specifically, has the potential to break down the current disconnected approach to event safety, security, health, and emergency planning. It offers a means of shifting the focus from a purely reactive stance to a more proactive, collaborative, and integrated approach. Improving health outcomes for music festival attendees, reducing gaps in planning, promoting consistency, and improving efficiency by reducing duplication of services will ultimately require coordination and collaboration from the beginning of event production to post-event reporting. Lund A , Turris SA . The Event Chain of Survival in the context of music festivals: a framework for improving outcomes at major planned events. Prehosp Disaster Med. 2017;32(4):437-443.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
... Balance Orders March 22, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act... security. Net Balance Order Pricing The uniform settlement price for net Balance Orders is currently established using a rounding methodology.\\11\\ If the current per share price of the Balance Order Security is...
Nevada National Security Site-Directed Research and Development FY 2011 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Howard Bender, comp.
2012-04-25
This fiscal year 2011 annual report of the Site-Directed Research and Development program, the 10th anniversary edition, recognizes a full decade of innovative R&D accomplishments in support of the Nevada National Security Site (NNSS). Last year the NNSS itself was renamed to reflect a diversifying mission, and our R&D program has contributed significantly to shape emerging missions that will continue to evolve. New initiatives in stockpile stewardship science, nonproliferation, and treaty verification and monitoring have had substantial successes in FY 2011, and many more accomplishments are expected. SDRD is the cornerstone on which many of these initiatives rest. Historically supportingmore » our main focus areas, SDRD is also building a solid foundation for new, and non-traditional, emerging national security missions. The program continues its charter to advance science and technology for a broad base of agencies including the U.S. Department of Energy (DOE), U.S. Department of Defense (DoD), U.S. Department of Homeland Security (DHS), and many others.« less
42 CFR 73.14 - Incident response.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., security breaches (including information systems), severe weather and other natural disasters, workplace... locations, (10) Site security and control, (11) Procedures for emergency evacuation, including type of...
6 CFR 27.225 - Site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
...) Identify and describe how security measures selected by the facility will address the applicable risk-based... explosive devices, water-borne explosive devices, ground assault, or other modes or potential modes identified by the Department; (3) Identify and describe how security measures selected and utilized by the...
Information Security and the Internet.
ERIC Educational Resources Information Center
Doddrell, Gregory R.
1996-01-01
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
Ecological Monitoring and Compliance Program 2010 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, D.J.; Anderson, D.C.; Hall, D.B.
The Ecological Monitoring and Compliance (EMAC) Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2010. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring of the Nonproliferation Test andmore » Evaluation Complex (NPTEC). During 2010, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2012 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Anderson, David C.; Greger, Paul D.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO, formerly Nevada Site Office), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2012. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat restoration monitoring, and (g) monitoring ofmore » the Nonproliferation Test and Evaluation Complex (NPTEC). During 2012, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Patel, Mitesh S; Patel, Neha; Small, Dylan S; Rosin, Roy; Rohrbach, Jeffrey I; Stromberg, Nathaniel; Hanson, C William; Asch, David A
2016-08-01
Changes in the medium of communication from paging to mobile secure text messaging may change clinical care, but the effects of these changes on patient outcomes have not been well examined. To evaluate the association between inpatient medicine service adoption of mobile secure text messaging and patient length of stay and readmissions. Observational study. Patients admitted to medicine services at the Hospital of the University of Pennsylvania (intervention site; n = 8995 admissions of 6484 patients) and Penn Presbyterian Medical Center (control site; n = 6799 admissions of 4977 patients) between May 1, 2012, and April 30, 2014. Mobile secure text messaging. Change in length of stay and 30-day readmissions, comparing patients at the intervention site to the control site before (May 1, 2012 to April 30, 2013) and after (May 1, 2013 to April 30, 2014) the intervention, adjusting for time trends and patient demographics, comorbidities, insurance, and disposition. During the pre-intervention period, the mean length of stay ranged from 4.0 to 5.0 days at the control site and from 5.2 to 6.7 days at the intervention site, but trends were similar. In the first month after the intervention, the mean length of stay was unchanged at the control site (4.7 to 4.7 days) but declined at the intervention site (6.0 to 5.4 days). Trends were mostly similar during the rest of the post-intervention period, ranging from 4.4 to 5.6 days at the control site and from 5.4 to 6.5 days at the intervention site. Readmission rates varied significantly within sites before and after the intervention, but overall trends were similar. In adjusted analyses, there was a significant decrease in length of stay for the intervention site relative to the control site during the post-intervention period compared to the pre-intervention period (-0.77 days ; 95 % CI, -1.14, -0.40; P < 0.001). There was no significant difference in the odds of readmission (OR, 0.97; 95 % CI: 0.81, 1.17; P = 0.77). These findings were supported by multiple sensitivity analyses. Compared to a control group over time, hospitalized medical patients on inpatient services whose care providers and staff were offered mobile secure text messaging showed a relative decrease in length of stay and no change in readmissions.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., Security Vulnerability Assessment, and Site Security Plan, through which the Department will collect and analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean...
The MANPAD Threat to Civilian Airliners
2006-03-03
PAGES: 19 KEY TERMS: Homeland Security; Non-Proliferation; Airport Security CLASSIFICATION: Unclassified This paper investigates strategic approaches...technological solutions and law enforcement operations to provide a competent airport security perimeter.”18 To combat this ominous threat of MANPADS...sites for phone and computer tips should be established with access for airport security , local and federal law enforcement, as well as intelligence
Defense.gov - Special Report - Travels With Gates
/Photos Leaders DoD Web Sites Contact Us Shangri-La Dialogue: Asia Security Summit Alaska Visit  June Shangri-La Dialogue on Asia Security Summit, Singapore, May 30, 2009. DoD photo by U.S. Air Force Master Robert M. Gates opened the ÂShangri-La Dialogue Asia security summit outlining broad security issues
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2014-12-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada. The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 567 based on the implementation of the corrective actions. The corrective actions implemented at CAU 567 were developed based on an evaluation of analytical data from the CAI, the assumed presence of COCs at specific locations, and the detailed and comparative analysis of the CAAs. The CAAs weremore » selected on technical merit focusing on performance, reliability, feasibility, safety, and cost. The implemented corrective actions meet all requirements for the technical components evaluated. The CAAs meet all applicable federal and state regulations for closure of the site. Based on the implementation of these corrective actions, the DOE, National Nuclear Security Administration Nevada Field Office provides the following recommendations: • No further corrective actions are necessary for CAU 567. • The Nevada Division of Environmental Protection issue a Notice of Completion to the DOE, National Nuclear Security Administration Nevada Field Office for closure of CAU 567. • CAU 567 be moved from Appendix III to Appendix IV of the FFACO.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2013-11-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.
Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A
2017-03-01
The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC sites. Results suggest the WIC SEBTC model deserves strong consideration. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
To Legalize or not to Legalize? That is the Question
2009-04-01
and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF
Food Security in India, China, and the World
2016-06-01
undernourishment and projections of food security are made by the United Nations Food and Agricultural Organization (FAO). The FAO has been collecting... agricultural data from individual nations for decades and makes yearly assessments of the current state of food insecurity and periodic projections of...future global food security. The FAO assessment of food security in 2050 presents a likely future based on projections of current agricultural
77 FR 19408 - Reinstate Index to Chapter III in 20 CFR
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0018] Reinstate Index to Chapter III in 20 CFR AGENCY: Social Security Administration. ACTION: Notice; correction. SUMMARY: The Social Security... Chapter III in Title 20 of the Code of Federal Regulations. The document contains a misprinted Web site...
78 FR 13897 - Final Revision and Publication of the 2012 Form M-1, Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-01
... DEPARTMENT OF LABOR Employee Benefits Security Administration RIN 1210-AB51 Final Revision and Publication of the 2012 Form M-1, Notice AGENCY: Employee Benefits Security Administration, Department of... Security Administration's (EBSA) Web site at www.dol.gov/ebsa . The revised form is substantively different...
75 FR 68395 - Agency Self-Evaluation Under Section 504 of the Rehabilitation Act of 1973
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
...-800-325- 0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0069] Agency Self-Evaluation Under Section 504 of the Rehabilitation Act of 1973 AGENCY: Social Security Administration. ACTION: Notice and request...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0029] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0030] Modifications to the Disability Determination Procedures; Extension of Testing of Some Disability Redesign Features AGENCY: Social Security...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... Secure Solutions USA, SBM Management Services, LP, ALSCO Portland Industrial, VWR International, Inc... G4S Secure Solutions USA, SBM Management Services, LP, Alsco Portland Industrial, VWR International... workers from Express Temporaries, Aerotek Commercial Staffing, G4S Secure Solutions USA, SBM Management...
ERIC Educational Resources Information Center
National Bureau of Standards (DOC), Washington, DC.
These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…
76 FR 16531 - Technical Correction for Neurological Listing Cross-Reference
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-24
... 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2011-0019] RIN 0960-AH33 Technical Correction for Neurological Listing Cross-Reference AGENCY: Social Security Administration. ACTION: Final...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2012 CFR
2012-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
17 CFR 248.126 - Delivery of opt out notices.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Delivery of opt out notices. 248.126 Section 248.126 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer obtained a product or service electronically and requires the...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2014 CFR
2014-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE U.S. TREASURY SECURITIES...
31 CFR 344.3 - What provisions apply to the SLGSafe Service?
Code of Federal Regulations, 2013 CFR
2013-07-01
... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Job Profiles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
75 FR 10328 - Wolf Creek Nuclear Operating Corporation, Wolf Creek Generating Station; Exemption
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... Plan, Safeguards Contingency Plan, and Cyber Security Plan referred to collectively hereafter as... its security plans. Pursuant to 10 CFR 51.32, ``Finding of no significant impact,'' the Commission has... by designing and implementing comprehensive site security programs. The amendments to 10 CFR 73.55...
17 CFR 248.124 - Reasonable opportunity to opt out.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reasonable opportunity to opt out. 248.124 Section 248.124 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Internet Web site at which the consumer has obtained a product or service. The consumer acknowledges...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Billings, Jay J.; Bonior, Jason D.; Evans, Philip G.
Securely transferring timing information in the electrical grid is a critical component of securing the nation's infrastructure from cyber attacks. One solution to this problem is to use quantum information to securely transfer the timing information across sites. This software provides such an infrastructure using a standard Java webserver that pulls the quantum information from associated hardware.
Giannoukos, S; Agapiou, A; Taylor, S
2018-01-17
On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-11
... From OMB of One Current Public Collection of Information: Aviation Security Customer Satisfaction.... The collection involves surveying travelers to measure customer satisfaction of aviation security in... OMB Control Number 1652-0013; Aviation Security Customer Satisfaction Performance Measurement...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jung, Haeryong; Lee, Eunyong; Jeong, YiYeong
Korea Radioactive-waste Management Corporation (KRMC) established in 2009 has started a new project to collect information on long-term stability of deep geological environments on the Korean Peninsula. The information has been built up in the integrated natural barrier database system available on web (www.deepgeodisposal.kr). The database system also includes socially and economically important information, such as land use, mining area, natural conservation area, population density, and industrial complex, because some of this information is used as exclusionary criteria during the site selection process for a deep geological repository for safe and secure containment and isolation of spent nuclear fuel andmore » other long-lived radioactive waste in Korea. Although the official site selection process has not been started yet in Korea, current integrated natural barrier database system and socio-economic database is believed that the database system will be effectively utilized to narrow down the number of sites where future investigation is most promising in the site selection process for a deep geological repository and to enhance public acceptance by providing readily-available relevant scientific information on deep geological environments in Korea. (authors)« less
2017-05-01
ER D C/ EL T R- 17 -7 Environmental Security Technology Certification Program (ESTCP) Evaluation of Uncertainty in Constituent Input...Environmental Security Technology Certification Program (ESTCP) ERDC/EL TR-17-7 May 2017 Evaluation of Uncertainty in Constituent Input Parameters...Environmental Evaluation and Characterization Sys- tem (TREECS™) was applied to a groundwater site and a surface water site to evaluate the sensitivity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
The purpose of this Corrective Action Decision Document is to identify and provide the rationale for the recommendation of corrective action alternatives (CAAs) for the 14 CASs within CAU 568. Corrective action investigation (CAI) activities were performed from April 2014 through May 2015, as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 568: Area 3 Plutonium Dispersion Sites, Nevada National Security Site, Nevada; and in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices. The purpose of the CAI was to fulfill data needs as defined during themore » DQO process. The CAU 568 dataset of investigation results was evaluated based on a data quality assessment. This assessment demonstrated that the dataset is complete and acceptable for use in fulfilling the DQO data needs. Based on the evaluation of analytical data from the CAI, review of future and current operations at the 14 CASs, and the detailed and comparative analysis of the potential CAAs, the following corrective actions are recommended for CAU 568: • No further action is the preferred corrective action for CASs 03-23-17, 03-23-22, 03-23-26. • Closure in place is the preferred corrective action for CAS 03-23-19; 03-45-01; the SE DCBs at CASs 03-23-20, 03-23-23, 03-23-31, 03-23-32, 03-23-33, and 03-23-34; and the Pascal-BHCA at CAS 03-23-31. • Clean closure is the preferred corrective action for CASs 03-08-04, 03-23-30, and 03-26-04; and the four well head covers at CASs 03-23-20, 03-23-23, 03-23-31, and 03-23-33.« less
Lessons Learned Implementing DOORS in a Citrix Environment
NASA Technical Reports Server (NTRS)
Bussman, Marie
2005-01-01
NASA's James Web Space Telescope (JWST) Project is a large multi-national project with geographically dispersed contractors that all need access to the Projects requirement database. Initially, the project utilized multiple DOORS databases with the built-in partitions feature to exchange modules amongst the various contractor sites. As the requirements databases matured the use of partitions became extremely difficult. There have been many issues such as incompatible versions of DOORS, inefficient mechanism for sharing modules, security concerns, performance issues, and inconsistent document import and export formats. Deployment of the client software with limited IT resources available was also an issue. The solution chosen by JWST was to integrate the use of a Citrix environment with the DOORS database to address most of the project concerns. The use of the Citrix solution allowed a single Requirements database in a secure environment via a web interface. The Citrix environment allows JWST to upgrade to the most current version of DOORS without having to coordinate multiple sites and user upgrades. The single requirements database eliminates a multitude of Configuration Management concerns and facilitated the standardization of documentation formats. This paper discusses the obstacles and the lessons learned throughout the installation, implementation, usage and deployment process of a centralized DOORS database solution.
17 CFR 230.405 - Definitions of terms.
Code of Federal Regulations, 2013 CFR
2013-04-01
... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...
17 CFR 230.405 - Definitions of terms.
Code of Federal Regulations, 2012 CFR
2012-04-01
... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...
17 CFR 230.405 - Definitions of terms.
Code of Federal Regulations, 2014 CFR
2014-04-01
... purchased for the account of plan participants, at prices not in excess of current market prices at the time... specified in the plan and based upon average or current market prices at the time of purchase. Electronic... maintain a market for the registrant's securities. Equity security. The term equity security means any...
76 FR 23326 - Intent To Request Renewal From OMB of One Current Public Collection of Information...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-26
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-24191... Notice. SUMMARY: The Transportation Security Administration (TSA) invites public comment on one currently... approved the collection of information for six months and TSA now seeks the maximum three-year approval...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-30
... From OMB of One Current Public Collection of Information: Aviation Security Customer Satisfaction... collection involves surveying travelers to measure customer satisfaction of aviation security in an effort to...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's approval...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory, Louis
This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of waste shipments to the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. This report summarizes the 1st quarter of fiscal year (FY) 2017 low-level radioactive waste (LLW), mixed low-level radioactive waste (MLLW) and classified non-radioactive (CNR) shipments. There were no shipments sent for offsite treatment from a NNSS facility and returned to the NNSS this quarter of FY2017.
Wang, Zhaoguo; Yang, Zhaoping; Du, Xishihui
2015-01-01
World Natural Heritage Sites (WNHS) are treasures that need human protection and invite appreciation, which makes conservation of WNHS an urgent task. This paper assesses where in the world threats are most pressing and which WNHS require emergency assistance. Using an analysis of "hot spots" and inverse distance weighting, it finds that Africa is the region where WNHS are least secure. Reports of the state of the conservation of WNHS describe the many threats that exist. Of these, management activities and institutional factors are the primary threats. The paper suggests relevant measures to improve the WNHS security.
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
A Design of a Surgical Site Verification System.
Shen, Biyu; He, Yan; Chen, Haoyang
2017-01-01
Patient security is a significant issue in medical research and clinical practice at present. The Surgical Verification System (Patent Number: ZL 201420079273.5) is designed to recognize and check surgical sites of patients so as to ensure operation security and decrease the risk for practitioners. Composition: (1) Operating Room Server, (2) Label Reader, (3) E-Label, (4) Surgical Site Display, (5) Ward Client, (6) Label Rader-Writer, and (7) Acousto-Optic Alarm. If the Surgical identification, the surgical site, and so on are incorrect, a flashing label control will appear when the alarm rings. You can specify a sound to play for the alarm, a picture to draw, and a message to send. It is a user-friendly system.
CBRAIN: a web-based, distributed computing platform for collaborative neuroimaging research
Sherif, Tarek; Rioux, Pierre; Rousseau, Marc-Etienne; Kassis, Nicolas; Beck, Natacha; Adalat, Reza; Das, Samir; Glatard, Tristan; Evans, Alan C.
2014-01-01
The Canadian Brain Imaging Research Platform (CBRAIN) is a web-based collaborative research platform developed in response to the challenges raised by data-heavy, compute-intensive neuroimaging research. CBRAIN offers transparent access to remote data sources, distributed computing sites, and an array of processing and visualization tools within a controlled, secure environment. Its web interface is accessible through any modern browser and uses graphical interface idioms to reduce the technical expertise required to perform large-scale computational analyses. CBRAIN's flexible meta-scheduling has allowed the incorporation of a wide range of heterogeneous computing sites, currently including nine national research High Performance Computing (HPC) centers in Canada, one in Korea, one in Germany, and several local research servers. CBRAIN leverages remote computing cycles and facilitates resource-interoperability in a transparent manner for the end-user. Compared with typical grid solutions available, our architecture was designed to be easily extendable and deployed on existing remote computing sites with no tool modification, administrative intervention, or special software/hardware configuration. As October 2013, CBRAIN serves over 200 users spread across 53 cities in 17 countries. The platform is built as a generic framework that can accept data and analysis tools from any discipline. However, its current focus is primarily on neuroimaging research and studies of neurological diseases such as Autism, Parkinson's and Alzheimer's diseases, Multiple Sclerosis as well as on normal brain structure and development. This technical report presents the CBRAIN Platform, its current deployment and usage and future direction. PMID:24904400
CBRAIN: a web-based, distributed computing platform for collaborative neuroimaging research.
Sherif, Tarek; Rioux, Pierre; Rousseau, Marc-Etienne; Kassis, Nicolas; Beck, Natacha; Adalat, Reza; Das, Samir; Glatard, Tristan; Evans, Alan C
2014-01-01
The Canadian Brain Imaging Research Platform (CBRAIN) is a web-based collaborative research platform developed in response to the challenges raised by data-heavy, compute-intensive neuroimaging research. CBRAIN offers transparent access to remote data sources, distributed computing sites, and an array of processing and visualization tools within a controlled, secure environment. Its web interface is accessible through any modern browser and uses graphical interface idioms to reduce the technical expertise required to perform large-scale computational analyses. CBRAIN's flexible meta-scheduling has allowed the incorporation of a wide range of heterogeneous computing sites, currently including nine national research High Performance Computing (HPC) centers in Canada, one in Korea, one in Germany, and several local research servers. CBRAIN leverages remote computing cycles and facilitates resource-interoperability in a transparent manner for the end-user. Compared with typical grid solutions available, our architecture was designed to be easily extendable and deployed on existing remote computing sites with no tool modification, administrative intervention, or special software/hardware configuration. As October 2013, CBRAIN serves over 200 users spread across 53 cities in 17 countries. The platform is built as a generic framework that can accept data and analysis tools from any discipline. However, its current focus is primarily on neuroimaging research and studies of neurological diseases such as Autism, Parkinson's and Alzheimer's diseases, Multiple Sclerosis as well as on normal brain structure and development. This technical report presents the CBRAIN Platform, its current deployment and usage and future direction.
Privacy and Security within Biobanking: The Role of Information Technology.
Heatherly, Raymond
2016-03-01
Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.
NASA Astrophysics Data System (ADS)
Kok, Dirk-Jan Daniel; Pande, Saket; Renata Cordeiro Ortigara, Angela; Savenije, Hubert; Uhlenbrook, Stefan
2018-02-01
Despite Africa controlling the vast majority of the global phosphate it also faces the greatest food shortages - partially due to a lack of access to the fertilizer market. A more accessible source of phosphorus comes from wastewater flows, which is currently lost through the discharge to open surface waters. Analysing the potential phosphorus production of urban and livestock wastewater in meeting partial agricultural demand for phosphorus can improve food security, reduce consumption of unrenewable phosphorus, reduce pollution, and aid the transitioning to a circular economy. In this study, a global overview is provided where a selection of P-production and P-consumption sites have been determined using global spatial data. Distances, investment costs and associated carbon footprints are then considered in modelling a simple, alternative trade network of struvite phosphorus flows. The network reveals potential for increasing the phosphorus security through phosphorus recycling in particularly the South Africa, Lake Victoria and Nigeria regions. Given Africa's rapid urbanization, phosphorus recovery from wastewater will prove an important step in creating sustainable communities, protecting the environment while improving food security, and so contributing to the United Nations 2030 Agenda for Sustainable Development.
Department of the Navy For Policy
Policy DEPARTMENT OF THE NAVY For Policy Search this site... Search Policy Security Skip navigation links Security Expand Security Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: - Policy Page Content Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: Enterprise OPM
United States European Command
Organization The Region History Media Library Articles Press Releases Photos Videos Documents Blog Posts Us Press Releases Site Policies Site Translation (Disclaimer) EUCOM's disclaimer regarding this . More in Site Policies External Links Privacy and Security Accessibility/Section 508 Site Translation
48 CFR 1804.470-3 - IT security requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the provisioning of services or products (e.g., research and development, engineering, manufacturing... Policies are available at the NASA IT Security Policy Web site at: http://www.nasa.gov/offices/ocio...
Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carilli, Jhon T.; Krenzien, Susan K.
2013-07-01
The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)
18. SITE BUILDING 002 SCANNER BUILDING VIEW OF ...
18. SITE BUILDING 002 - SCANNER BUILDING - VIEW OF SITE SECURITY OFFICE ACCESS DOOR FROM EXTERIOR OF OFFICE. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
A DICOM based radiotherapy plan database for research collaboration and reporting
NASA Astrophysics Data System (ADS)
Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.
2014-03-01
Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.
AFB Directory of Services Listings
... 520) 770-3268 (TDD/TTY) Arizona Department of Economic Security: Rehabilitation Services Administration 1789 West Jefferson Street, ... Arizona Division Aging and Adult Services Department of Economic Security 1789 W. Jefferson, Site Code 950A-2SW ...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-26
... From OMB of One Current Public Collection of Information: Highway Corporate Security Review AGENCY... in the highway and motor carrier industry by way of its Highway Corporate Security Review (CSR... OMB Control Number 1652-0036; Corporate Security Review. Under the Aviation and Transportation...
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2014 CFR
2014-04-01
... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to... determining the current availability of an optional form of benefit or social security supplement if the...
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2013 CFR
2013-04-01
... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to... determining the current availability of an optional form of benefit or social security supplement if the...
26 CFR 1.401(a)(4)-4 - Nondiscriminatory availability of benefits, rights, and features.
Code of Federal Regulations, 2012 CFR
2012-04-01
... with respect to an optional form of benefit or a social security supplement is disregarded in determining whether the optional form of benefit or the social security supplement is currently available to... determining the current availability of an optional form of benefit or social security supplement if the...
Social Media and the U.S. Army: Maintaining a Balance
2011-05-19
Facebook is the largest and most popular social media site in the Western world. The site was originally created in February 2004 by Mark Zuckerberg and...twenty-something person’s concern pertains only to keeping his activities from his parents’ view. Facebook founder Mark Zuckerberg stated this...Security is more than the marking , handling, and classifying of information. It is different from traditional security in that the Army wants to
2005-06-01
Should a disaster or violence strike numerous sites in the City, our 54 officer would possibly be soley (sic) responsible for responding to an...the ability to interact efficiently with other first responders . 59 3. The New York State Courts would have, on site a well trained, dedicated...AS CERTIFIED FIRST RESPONDERS ASSISTING IN HOMELAND SECURITY AND COMMUNITY EMERGENCY PREPAREDNESS by Jewel E. Williams June 2005
Utilization of Integrated Assessment Modeling for determining geologic CO2 storage security
NASA Astrophysics Data System (ADS)
Pawar, R.
2017-12-01
Geologic storage of carbon dioxide (CO2) has been extensively studied as a potential technology to mitigate atmospheric concentration of CO2. Multiple international research & development efforts, large-scale demonstration and commercial projects are helping advance the technology. One of the critical areas of active investigation is prediction of long-term CO2 storage security and risks. A quantitative methodology for predicting a storage site's long-term performance is critical for making key decisions necessary for successful deployment of commercial scale projects where projects will require quantitative assessments of potential long-term liabilities. These predictions are challenging given that they require simulating CO2 and in-situ fluid movements as well as interactions through the primary storage reservoir, potential leakage pathways (such as wellbores, faults, etc.) and shallow resources such as groundwater aquifers. They need to take into account the inherent variability and uncertainties at geologic sites. This talk will provide an overview of an approach based on integrated assessment modeling (IAM) to predict long-term performance of a geologic storage site including, storage reservoir, potential leakage pathways and shallow groundwater aquifers. The approach utilizes reduced order models (ROMs) to capture the complex physical/chemical interactions resulting due to CO2 movement and interactions but are computationally extremely efficient. Applicability of the approach will be demonstrated through examples that are focused on key storage security questions such as what is the probability of leakage of CO2 from a storage reservoir? how does storage security vary for different geologic environments and operational conditions? how site parameter variability and uncertainties affect storage security, etc.
Extractive waste management: A risk analysis approach.
Mehta, Neha; Dino, Giovanna Antonella; Ajmone-Marsan, Franco; Lasagna, Manuela; Romè, Chiara; De Luca, Domenico Antonio
2018-05-01
Abandoned mine sites continue to present serious environmental hazards because the heavy metals associated with extractive waste are continuously released into the environment, where they threaten human life and the environment. Remediating and securing extractive waste are complex, lengthy and costly processes. Thus, in most European countries, a site is considered for intervention when it poses a risk to human health and the surrounding environment. As a consequence, risk analysis presents a viable decisional approach towards the management of extractive waste. To evaluate the effects posed by extractive waste to human health and groundwater, a risk analysis approach was used for an abandoned nickel extraction site in Campello Monti in North Italy. This site is located in the Southern Italian Alps. The area consists of large and voluminous mafic rocks intruded by mantle peridotite. The mining activities in this area have generated extractive waste. A risk analysis of the site was performed using Risk Based Corrective Action (RBCA) guidelines, considering the properties of extractive waste and water for the properties of environmental matrices. The results showed the presence of carcinogenic risk due to arsenic and risks to groundwater due to nickel. The results of the risk analysis form a basic understanding of the current situation at the site, which is affected by extractive waste. Copyright © 2017 Elsevier B.V. All rights reserved.
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2011 CFR
2011-07-01
... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (10) Techniques used to circumvent security...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (10) Techniques used to circumvent security...
NASA Astrophysics Data System (ADS)
Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Williams, M.; Smith, K. D.
2012-12-01
The Nevada Seismological Laboratory (NSL) manages time-series data and high-throughput IP telemetry for the National Center for Nuclear Security (NCNS) Source Physics Experiment (SPE), underway on the Nevada National Security Site (NNSS). During active-source experiments, SPE's heterogeneous systems record over 350 channels of a variety of data types including seismic, infrasound, acoustic, and electro-magnetic. During the interim periods, broadband and short period instruments record approximately 200 channels of continuous, high-sample-rate seismic data. Frequent changes in sensor and station configurations create a challenging meta-data environment. Meta-data account for complete operational histories, including sensor types, serial numbers, gains, sample rates, orientations, instrument responses, data-logger types etc. To date, these catalogue 217 stations, over 40 different sensor types, and over 1000 unique recording configurations (epochs). Facilities for processing, backup, and distribution of time-series data currently span four Linux servers, 60Tb of disk capacity, and two data centers. Bandwidth, physical security, and redundant power and cooling systems for acquisition, processing, and backup servers are provided by NSL's Reno data center. The Nevada System of Higher Education (NSHE) System Computer Services (SCS) in Las Vegas provides similar facilities for the distribution server. NSL staff handle setup, maintenance, and security of all data management systems. SPE PIs have remote access to meta-data, raw data, and CSS3.0 compilations, via SSL-based transfers such as rsync or secure-copy, as well as shell access for data browsing and limited processing. Meta-data are continuously updated and posted on the Las Vegas distribution server as station histories are better understood and errors are corrected. Raw time series and refined CSS3.0 data compilations with standardized formats are transferred to the Las Vegas data server as available. For better data availability and station monitoring, SPE is beginning to leverage NSL's wide-area digital IP network with nine SPE stations and six Rock Valley area stations that stream continuous recordings in real time to the NSL Reno data center. These stations, in addition to eight regional legacy stations supported by National Security Technologies (NSTec), are integrated with NSL's regional monitoring network and constrain a high-quality local earthquake catalog for NNSS. The telemetered stations provide critical capabilities for SPE, and infrastructure for earthquake response on NNSS as well as southern Nevada and the Las Vegas area.
Wireless just-in-time training of mobile skilled support personnel
NASA Astrophysics Data System (ADS)
Bandera, Cesar; Marsico, Michael; Rosen, Mitchel; Schlegel, Barry
2006-05-01
Skilled Support Personnel (SSP) serve emergency response organizations during an emergency incident, and include laborers, operating engineers, carpenters, ironworkers, sanitation workers and utility workers. SSP called to an emergency incident rarely have recent detailed training on the chemical, biological, radiological, nuclear and/or explosives (CBRNE) agents or the personal protection equipment (PPE) relevant to the incident. This increases personal risk to the SSP and mission risk at the incident site. Training for SSP has been identified as a critical need by the National Institute for Environmental Health Sciences, Worker Education and Training Program. We present a system being developed to address this SSP training shortfall by exploiting a new training paradigm called just-in-time training (JITT) made possible by advances in distance learning and cellular telephony. In addition to the current conventional training at regularly scheduled instructional events, SSP called to an emergency incident will have secure access to short (<5 minutes) training modules specific to the incident and derived from the Occupational Safety and Health Administration (OSHA) Disaster Site Worker Course. To increase retention, each learning module incorporates audio, video, interactive simulations, graphics, animation, and assessment designed for the user interface of most current cell phones. Engineering challenges include compatibility with current cell phone technologies and wireless service providers, integration with the incident management system, and SCORM compliance.
User Vulnerability and its Reduction on a Social Networking Site
2014-01-01
social networking sites bring about new...and explore other users’ profiles and friend networks. Social networking sites have reshaped business models [Vayner- chuk 2009], provided platform... social networking sites is to enable users to be more social, user privacy and security issues cannot be ignored. On one hand, most social networking sites
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-06
...-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2013-0023] RIN 0960-AH59... Disability Determinations and Compassionate Allowances AGENCY: Social Security Administration. ACTION: Final...
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Behavioral Interview Guidelines by Job Roles. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
DOE Office of Scientific and Technical Information (OSTI.GOV)
O'Neil, Lori Ross; Conway, T. J.; Tobey, D. H.
The Secure Power Systems Professional Phase III final report was released last year which an appendix of Individual and Team Performance Guidelines. This new report is that appendix broken out as a standalone document to assist utilities in recruiting and developing Secure Power Systems Professionals at their site.
Shridharani, Sachin M.; Stapleton, Sahael M.; Redett, Richard J.; Magarakis, Michael; Rosson, Gedge D.
2010-01-01
Background: The primary objective of this study is to report a novel technique that uses the gastrointestinal anastomosis (GIA) stapler for harvesting and securing the gracilis muscle in facial reanimation surgery. Methods: We conducted a retrospective chart review with 18 consecutive patients who underwent gracilis muscle flap transfer with or without the use of a GIA stapler. Results: Of 11 operations with the GIA stapler, one patient developed a hematoma (donor site) and another required drainage of an abscess (recipient site). Of 8 operations without the use of the stapler, one patient had total flap failure and three required drainage of an abscess (2 recipient sites and 1 donor site). These differences trended toward improvement but were not statistically different. Conclusions: The use of the GIA stapler is a fast, safe technique. Larger studies are, however, warranted to further examine this novel approach in order to test precisely what factors of increased efficiency occur, the amount of suture pull-through, and overall tension capable of being applied to the secured staple line. PMID:20396379
Code of Federal Regulations, 2014 CFR
2014-10-01
..., corporate bonds, or other corporate securities in any single railroad, or a company engaged in the... bonds or other corporate securities, if the current aggregate market value of the stocks and other... a current aggregate market value of $10,000 or more, or an option to purchase such securities, shall...
Acute care patient portals: a qualitative study of stakeholder perspectives on current practices.
Collins, Sarah A; Rozenblum, Ronen; Leung, Wai Yin; Morrison, Constance Rc; Stade, Diana L; McNally, Kelly; Bourie, Patricia Q; Massaro, Anthony; Bokser, Seth; Dwyer, Cindy; Greysen, Ryan S; Agarwal, Priyanka; Thornton, Kevin; Dalal, Anuj K
2017-04-01
To describe current practices and stakeholder perspectives of patient portals in the acute care setting. We aimed to: (1) identify key features, (2) recognize challenges, (3) understand current practices for design, configuration, and use, and (4) propose new directions for investigation and innovation. Mixed methods including surveys, interviews, focus groups, and site visits with stakeholders at leading academic medical centers. Thematic analyses to inform development of an explanatory model and recommendations. Site surveys were administered to 5 institutions. Thirty interviews/focus groups were conducted at 4 site visits that included a total of 84 participants. Ten themes regarding content and functionality, engagement and culture, and access and security were identified, from which an explanatory model of current practices was developed. Key features included clinical data, messaging, glossary, patient education, patient personalization and family engagement tools, and tiered displays. Four actionable recommendations were identified by group consensus. Design, development, and implementation of acute care patient portals should consider: (1) providing a single integrated experience across care settings, (2) humanizing the patient-clinician relationship via personalization tools, (3) providing equitable access, and (4) creating a clear organizational mission and strategy to achieve outcomes of interest. Portals should provide a single integrated experience across the inpatient and ambulatory settings. Core functionality includes tools that facilitate communication, personalize the patient, and deliver education to advance safe, coordinated, and dignified patient-centered care. Our findings can be used to inform a "road map" for future work related to acute care patient portals. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com
Personal health record systems and their security protection.
Win, Khin Than; Susilo, Willy; Mu, Yi
2006-08-01
The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.
7 CFR 766.113 - Buyout of loan at current market value.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 7 2010-01-01 2010-01-01 false Buyout of loan at current market value. 766.113... Buyout of loan at current market value. (a) Borrower eligibility. A delinquent borrower may buy out the borrower's FLP loans at the current market value of the loan security, including security not in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-03
... Information Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request... current industry security practices through its Pipeline Corporate Security Review (PCSR) program. The...
33 CFR 106.262 - Security measures for newly-hired employees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... following information on the new hire into the Coast Guard's Homeport Web site (http://homeport.uscg.mil): (i) Full legal name, including middle name if one exists; (ii) Date of birth; (iii) Social security...
33 CFR 106.262 - Security measures for newly-hired employees.
Code of Federal Regulations, 2011 CFR
2011-07-01
... following information on the new hire into the Coast Guard's Homeport Web site (http://homeport.uscg.mil): (i) Full legal name, including middle name if one exists; (ii) Date of birth; (iii) Social security...
Nevada Test Site Waste Acceptance Criteria (NTSWAC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
NNSA /NSO Waste Management Project
This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, Nevada Test Site Waste Acceptance Criteria (NTSWAC). The NTSWAC provides the requirements, terms, and conditions under which the Nevada Test Site will accept low-level radioactive (LLW) and LLW Mixed Waste (MW) for disposal.
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2013 CFR
2013-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2012 CFR
2012-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
12 CFR 555.310 - How do I notify OTS?
Code of Federal Regulations, 2014 CFR
2014-01-01
...) Describe the transactional web site. (2) Indicate the date the transactional web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional web site. (b) Transition provision. If you established a transactional web site after the date of your last...
A framework for secure and decentralized sharing of medical imaging data via blockchain consensus.
Patel, Vishal
2018-04-01
The electronic sharing of medical imaging data is an important element of modern healthcare systems, but current infrastructure for cross-site image transfer depends on trust in third-party intermediaries. In this work, we examine the blockchain concept, which enables parties to establish consensus without relying on a central authority. We develop a framework for cross-domain image sharing that uses a blockchain as a distributed data store to establish a ledger of radiological studies and patient-defined access permissions. The blockchain framework is shown to eliminate third-party access to protected health information, satisfy many criteria of an interoperable health system, and readily generalize to domains beyond medical imaging. Relative drawbacks of the framework include the complexity of the privacy and security models and an unclear regulatory environment. Ultimately, the large-scale feasibility of such an approach remains to be demonstrated and will depend on a number of factors which we discuss in detail.
U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun
2009-10-07
The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mark Burmeister and Patrick Matthews
2012-11-01
The corrective action sites (CASs) within CAU 465 are located within Areas 6 and 27 of the NNSS. CAU 465 comprises the following CASs: • 00-23-01, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie site. • 00-23-02, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Dog site. • 00-23-03, Hydronuclear Experiment, located in Area 27 of the NNSS and known as the Charlie Prime and Anja sites. • 06-99-01, Hydronuclear, located in Area 6 of the NNSS and known as the Trailer 13 site. The purpose of this CRmore » is to provide documentation supporting the completed corrective actions and provide data confirming that the closure objectives for CASs within CAU 465 were met. From September 2011 through July 2012, closure activities were performed as set forth in the Streamlined Approach for Environmental Restoration Plan for CAU 465: Hydronuclear, Nevada National Security Site, Nevada.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Montoya, Amber L.; Wagner, Katrina; Goering, Teresa Lynn
Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation, a subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), through the Sandia Site Office (SSO), in Albuquerque, NM, manages TTR and KTF's operations. Sandia Corporation conducts operations at TTR in support of DOE/NNSA's Weapons Ordnance Program and has operated the site since 1957. Westinghouse Government Services subcontracts to Sandia Corporation in administering most of the environmental programs at TTR. Sandia Corporation operates KTF as a rocket preparation launching and tracking facility.more » This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2004. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia Corporation is responsible only for those environmental program activities related to its operations. The DOE/NNSA, Nevada Site Office (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 450.1, Environmental Protection Program (DOE 2005) and DOE Order 231.1A, Environment, Safety, and Health Reporting (DOE 2004b).« less
Perimeter security alarm system based on fiber Bragg grating
NASA Astrophysics Data System (ADS)
Zhang, Cui; Wang, Lixin
2010-11-01
With the development of the society and economy and the improvement of living standards, people need more and more pressing security. Perimeter security alarm system is widely regarded as the first line of defense. A highly sensitive Fiber Bragg grating (FBG) vibration sensor based on the theory of the string vibration, combined with neural network adaptive dynamic programming algorithm for the perimeter security alarm system make the detection intelligently. Intelligent information processing unit identify the true cause of the vibration of the invasion or the natural environment by analyzing the frequency of vibration signals, energy, amplitude and duration. Compared with traditional perimeter security alarm systems, such as infrared perimeter security system and electric fence system, FBG perimeter security alarm system takes outdoor passive structures, free of electromagnetic interference, transmission distance through optical fiber can be as long as 20 km It is able to detect the location of event within short period of time (high-speed response, less than 3 second).This system can locate the fiber cable's breaking sites and alarm automatically if the cable were be cut. And the system can prevent effectively the false alarm from small animals, birds, strong wind, scattering things, snowfalls and vibration of sensor line itself. It can also be integrated into other security systems. This system can be widely used in variety fields such as military bases, nuclear sites, airports, warehouses, prisons, residence community etc. It will be a new force of perimeter security technology.
Auditing Albaha University Network Security using in-house Developed Penetration Tool
NASA Astrophysics Data System (ADS)
Alzahrani, M. E.
2018-03-01
Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.
A secure distributed logistic regression protocol for the detection of rare adverse drug events
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-01-01
Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-05-01
There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garland, Sid; Brown, Sally; Sims, Lynn
Long-term stewardship is the set of activities necessary to return contaminated land to safe and beneficial use. The activities include physical and legal controls to prevent inappropriate exposure to contamination left in place at a site. It is the longest phase of the Department of Energy's Environmental Management Program and ensures the protection of human health and the environment for varied end uses. At the Department of Energy's Oak Ridge Reservation an automated program has been developed and implemented that tracks the multitude of long-term stewardship activities. The Oak Ridge Reservation is a large site that currently has over 50more » actions requiring long-term stewardship activities. The Oak Ridge Reservation consists primarily of three plant sites, and long-term stewardship will enable these sites to be leased to private entities (East Tennessee Technology Park), modernized for an evolving national security mission (Y-12 National Security Complex), and revitalized to continue multi-disciplinary research (Oak Ridge National Laboratory). The varied site end uses of the individual plant sites coupled with the multitude of controls required by leaving waste in place presents challenges. A single remedial action may include surveillance and maintenance activities, media monitoring, property record notices as well as physical controls such as fences and signs. Thus, the array of long-term stewardship activities is complex and intermingled (over 200 inspections each year at various frequencies are required currently) and requires an effective tracking program, termed the Land Use Manager. The Land Use Manager is a web-based data management application for use by personnel responsible for implementing, maintaining, and verifying engineering and land use controls on the Oak Ridge Reservation. The program is a data entry and tracking tool, as well as a notification tool. The status and performance of engineering and land use controls are checked annually for evaluation in the required Remediation Effectiveness Report, and the automated Land Use Manager collects, maintains, tracks, notifies, monitors, and manages the information necessary to perform this evaluation. Land Use Manager tracks site information including type of contamination, regulatory requirements, locates land use controls; provides information on inspections, certification, and reporting; and provides reports. Most data access features, e.g., view, print, query, and download, are available to all users; however, data input, updating, and editing are restricted to the personnel directly responsible for monitoring and inspection. The Land Use Manager application was developed for the Department of Energy Oak Ridge Office by URS - CH2M Oak Ridge LLC, Restoration Services Incorporated, and MIJARA Corporation to meet the specific needs of long-term stewardship tracking on the Oak Ridge Reservation. The successful implementation of long-term stewardship enables the future government and private activities being planned on the Oak Ridge Reservation to proceed. (authors)« less
Defense.gov Special Report: The Cyber Domain - Security and Operations
U.S. Air Force National Guard U.S. Coast Guard All DOD Sites Military/DOD Social Media Sites Register : Email Email Icon: RSS Feeds RSS Feeds Icon: Widgets Widgets MORE SOCIAL MEDIA SITES »
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
L-325 Sagebrush Habitat Mitigation Project: FY2009 Compensation Area Monitoring Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Durham, Robin E.; Sackschewsky, Michael R.
2009-09-29
Annual monitoring in support of the Fluor Daniel Hanford Company (Fluor) Mitigation Action Plan (MAP) for Project L-325, Electrical Utility Upgrades was conducted in June 2009. MAP guidelines defined mitigation success for this project as 3000 established sagebrush transplants on a 4.5 ha mitigation site after five monitoring years. Annual monitoring results suggest that an estimated 2130 sagebrush transplants currently grow on the site. Additional activities in support of this project included gathering sagebrush seed and securing a local grower to produce between 2250 and 2500 10-in3 tublings for outplanting during the early winter months of FY2010. If the minimummore » number of seedlings grown for this planting meets quality specifications, and planting conditions are favorable, conservative survival estimates indicate the habitat mitigation goals outlined in the MAP will be met in FY2014.« less
Research of remote control for Chinese Antarctica Telescope based on iridium satellite communication
NASA Astrophysics Data System (ADS)
Xu, Lingzhe; Yang, Shihai
2010-07-01
Astronomers are ever dreaming of sites with best seeing on the Earth surface for celestial observation, and the Antarctica is one of a few such sites only left owing to the global air pollution. However, Antarctica region is largely unaccessible for human being due to lacking of fundamental living conditions, travel facilities and effective ways of communication. Worst of all, the popular internet source as a general way of communication scarcely exists there. Facing such a dilemma and as a solution remote control and data transmission for telescopes through iridium satellite communication has been put forward for the Chinese network Antarctic Schmidt Telescopes 3 (AST3), which is currently under all round research and development. This paper presents iridium satellite-based remote control application adapted to telescope control. The pioneer work in China involves hardware and software configuration utilizing techniques for reliable and secure communication, which is outlined in the paper too.
A security architecture for interconnecting health information systems.
Gritzalis, Dimitris; Lambrinoudakis, Costas
2004-03-31
Several hereditary and other chronic diseases necessitate continuous and complicated health care procedures, typically offered in different, often distant, health care units. Inevitably, the medical records of patients suffering from such diseases become complex, grow in size very fast and are scattered all over the units involved in the care process, hindering communication of information between health care professionals. Web-based electronic medical records have been recently proposed as the solution to the above problem, facilitating the interconnection of the health care units in the sense that health care professionals can now access the complete medical record of the patient, even if it is distributed in several remote units. However, by allowing users to access information from virtually anywhere, the universe of ineligible people who may attempt to harm the system is dramatically expanded, thus severely complicating the design and implementation of a secure environment. This paper presents a security architecture that has been mainly designed for providing authentication and authorization services in web-based distributed systems. The architecture has been based on a role-based access scheme and on the implementation of an intelligent security agent per site (i.e. health care unit). This intelligent security agent: (a). authenticates the users, local or remote, that can access the local resources; (b). assigns, through temporary certificates, access privileges to the authenticated users in accordance to their role; and (c). communicates to other sites (through the respective security agents) information about the local users that may need to access information stored in other sites, as well as about local resources that can be accessed remotely.
SPIDERS Bi-Directional Charging Station Interconnection Testing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, M.
2013-09-01
The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bender, Howard A.
This report presents results of multiple research projects, new and ongoing, funded under the Site-Directed Research and Development Program for the Nevada National Security Site during federal fiscal year 2015. The Site's legacy capabilities in remote sensing combined with new paradigms for emergency response and consequence management help drive the need to develop advanced aerial sensor platforms. Likewise, dynamic materials science is a critical area of scientific research for which basic physics issues are still unresolved. New methods of characterizing materials in extreme states are vitally needed, and these efforts are paving the way with new knowledge. Projects selected inmore » FY 2015 for the Exploratory Research portfolio exhibit a strong balance of NNSS mission relevance. Geoscience, seismology, and techniques for detecting underground nuclear events are still essential focus areas. Many of the project reports in the second major section of this annual report are ongoing continuations in multi-year lifecycles. Diagnostic techniques for stockpile and nuclear security science figured prominently as well, with a few key efforts coming to fruition, such as phase transition detection. In other areas, modeling efforts toward better understanding plasma focus physics has also started to pay dividends for major program needs.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-23
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent To Request Renewal...: Transportation Security Administration, DHS. ACTION: 60-Day notice. SUMMARY: The Transportation Security... provide feedback to TSA about their experiences with TSA's airport security process and procedures while...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... from TSA's Corporate Security Review (CSR) in that a CSR looks at corporate or company-wide security... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent to Request Renewal... of the Top 100 Most Critical Pipelines AGENCY: Transportation Security Administration, DHS. ACTION...
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The 85-acre Bofors Nobel site contains an active specialty chemical production plant in Egelston Township, Muskegon County, Michigan. Site features include an unused landfill. The ROD amends a 1990 ROD written by the state, which consisted of onsite incineration and onsite landfilling of lagoon area soil, construction of RCRA-type secure landfill cells to hold non-incinerated material and ash from the incinerated sludge. The selected amended remedial action for the site includes excavating and containing approximately 767,000 cubic yards of untreated sludge and soil in onsite RCRA-type secure landfill cells constructed as part of the original remedial action. The ROD Amendmentmore » does not address any issue associated with ground water treatment.« less
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2013 CFR
2013-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2014 CFR
2014-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
33 CFR 106.205 - Company Security Officer (CSO).
Code of Federal Regulations, 2012 CFR
2012-07-01
...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...
Ecological Monitoring and Compliance Program 2015 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek B.; Ostler, W. Kent; Anderson, David C.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2015. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2015, all applicable laws, regulations, andmore » permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Ecological Monitoring and Compliance Program 2016 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hall, Derek; Perry, Jeanette; Ostler, W. Kent
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO), monitors the ecosystem of the Nevada National Security Site (NNSS) and ensures compliance with laws and regulations pertaining to NNSS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2016. Program activities included (a) biological surveys at proposed activity sites, (b) desert tortoise compliance, (c) ecosystem monitoring, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, and (f) habitat restoration monitoring. During 2016, all applicable laws, regulations, andmore » permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory, Louis
2014-12-02
This report satisfies the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) commitment to prepare a quarterly summary report of radioactive waste shipments to and from the Nevada National Security Site (NNSS) Radioactive Waste Management Complex (RWMC) at Area 5. There were no shipments sent for offsite treatment and returned to the NNSS this quarter. There was one shipment of two drums sent for offsite treatment and disposal. This report summarizes the 4th quarter of Fiscal Year (FY) 2014 low-level radioactive waste (LLW) and mixed low-level radioactive waste (MLLW) shipments. This report also includes annualmore » summaries for FY 2014.« less
NASA Astrophysics Data System (ADS)
Patel, M. N.; Looney, P.; Young, K.; Halling-Brown, M. D.
2014-03-01
Radiological imaging is fundamental within the healthcare industry and has become routinely adopted for diagnosis, disease monitoring and treatment planning. Over the past two decades both diagnostic and therapeutic imaging have undergone a rapid growth, the ability to be able to harness this large influx of medical images can provide an essential resource for research and training. Traditionally, the systematic collection of medical images for research from heterogeneous sites has not been commonplace within the NHS and is fraught with challenges including; data acquisition, storage, secure transfer and correct anonymisation. Here, we describe a semi-automated system, which comprehensively oversees the collection of both unprocessed and processed medical images from acquisition to a centralised database. The provision of unprocessed images within our repository enables a multitude of potential research possibilities that utilise the images. Furthermore, we have developed systems and software to integrate these data with their associated clinical data and annotations providing a centralised dataset for research. Currently we regularly collect digital mammography images from two sites and partially collect from a further three, with efforts to expand into other modalities and sites currently ongoing. At present we have collected 34,014 2D images from 2623 individuals. In this paper we describe our medical image collection system for research and discuss the wide spectrum of challenges faced during the design and implementation of such systems.
Launching the Next Generation IODP Site Survey Data Bank
NASA Astrophysics Data System (ADS)
Miller, S. P.; Helly, J.; Clark, D.; Eakins, B.; Sutton, D.; Weatherford, J.; Thatch, G.; Miville, B.; Zelt, B.
2005-12-01
The next generation all-digital Site Survey Data Bank (SSDB) became operational on August 15, 2005 as an online resource for Integrated Ocean Drilling Program (IODP) proponents, reviewers, panels and operations, worldwide. There are currently 123 active proposals for drilling at sites distributed across the globe, involving nearly 1000 proponents from more than 40 countries. The goal is to provide an authoritative, persistent, secure, password-controlled and easily-used home for contributed data objects, as proposals evolve through their life cycle from preliminary phases to planned drilling expeditions. Proposal status can be monitored graphically by proposal number, data type or date. A Java SSDBviewer allows discovery of all proposal data objects, displayed over a basemap of global topography, crustal age or other custom maps. Data can be viewed or downloaded under password control. Webform interfaces assist with the uploading of data and metadata. Thirty four different standard data types are currently supported. The system was designed as a fully functioning digital library, not just a database or a web archive, drawing upon the resources of the SIOExplorer Digital Library project. Blocks of metadata are organized to support discovery and use, as appropriate for each data type. The SSDB has been developed by a UCSD team of researchers and computer scientists at the Scripps Institution of Oceanography and the San Diego Supercomputer Center, under contract with IODP Management International Inc., supported by NSF OCE 0432224.
Cyber Security and Resilient Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson
2009-07-01
The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
On the Brink: Instability and the Prospect of State Failure in Pakistan
2010-04-12
unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-12-31
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-01-01
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office
2004-04-01
This Corrective Action Decision Document identifies the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office's corrective action alternative recommendation for each of the corrective action sites (CASs) within Corrective Action Unit (CAU) 204: Storage Bunkers, Nevada Test Site (NTS), Nevada, under the Federal Facility Agreement and Consent Order. An evaluation of analytical data from the corrective action investigation, review of current and future operations at each CAS, and a detailed comparative analysis of potential corrective action alternatives were used to determine the appropriate corrective action for each CAS. There are six CASs in CAU 204, which aremore » all located between Areas 1, 2, 3, and 5 on the NTS. The No Further Action alternative was recommended for CASs 01-34-01, 02-34-01, 03-34-01, and 05-99-02; and a Closure in Place with Administrative Controls recommendation was the preferred corrective action for CASs 05-18-02 and 05-33-01. These alternatives were judged to meet all requirements for the technical components evaluated as well as applicable state and federal regulations for closure of the sites and will eliminate potential future exposure pathways to the contaminated media at CAU 204.« less
2006-10-25
at this site: Timestamp IP Address Description Severity 2003 Sep 03 14:52:28 150.24.11.1 Security-Trojan- Sub7 18 2003 Sep 03 14:52:33...150.24.11.2 Security-Trojan- Sub7 18 2003 Sep 03 14:52:38 150.24.11.3 Security-Trojan- Sub7 18 4. The Security Analyst clicks on one of the lines in this...table: Severity Parameter Name Value Descriptive Details Location 3 HMCS Iroquois Type of Incident 2 Security-Trojan- Sub7 Asset Type 1 Workstation
77 FR 46773 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-06
... SECURITIES AND EXCHANGE COMMISSION Proposed Collection; Comment Request Upon Written Request, Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... specified financial information to the Commission and post it on their corporate Web sites, if any, in...
Leap Frog Digital Sensors and Definition, Integration & Testing FY 2003 Annual Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Shoemaker, Steven V.
2003-12-31
The objective of Leap Frog is to develop a comprehensive security tool that is transparent to the user community and more effective than current methods for preventing and detecting security compromises of critical physical and digital assets. Current security tools intrude on the people that interact with these critical assets by requiring them to perform additional functions or having additional visible sensors. Leap Frog takes security to the next level by being more effective and reducing the adverse impact on the people interacting with protected assets.
Measuring Stability and Security in Iraq
2008-06-01
1 1.1. Political Stability .....................................................................................................1...Section 1—Stability and Security 1.1 Political Stability With recent improvements in security, the current political environment in Iraq is
FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE
The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, Katrina; Sanchez, Rebecca V.; Mayeux, Lucie
2003-09-01
Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation, a subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), through the Sandia Site Office (SSO), in Albuquerque, NM, oversees TTR and KTF's operations. Sandia Corporation conducts operations at TTR in support of DOE/NNSA's Weapons Ordnance Program and has operated the site since 1957. Westinghouse Government Services subcontracts to Sandia Corporation in administering most of the environmental programs at TTR. Sandia Corporation operates KTF as a rocket preparation launching and tracking facility.more » This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2002. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia Corporation is responsible only for those environmental program activities related to its operations. The DOE/NNSA, Nevada Site Office (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 5400.1, General Environmental Protection Program (DOE 1990) and DOE Order 231.1, Environment, Safety, and Health Reporting (DOE 1996).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, Katrina; Sanchez, Rebecca V.; Mayeux, Lucie
2004-09-01
Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation, a subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE), National Nuclear Security Administration (NNSA), through the Sandia Site Office (SSO), in Albuquerque, NM, manages TTR and KTF's operations. Sandia Corporation conducts operations at TTR in support of DOE/NNSA's Weapons Ordnance Program and has operated the site since 1957. Westinghouse Government Services subcontracts to Sandia Corporation in administering most of the environmental programs at TTR. Sandia Corporation operates KTF as a rocket preparation launching and tracking facility.more » This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2003. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia Corporation is responsible only for those environmental program activities related to its operations. The DOE/NNSA, Nevada Site Office (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 450.1, Environmental Protection Program (DOE 2003) and DOE Order 231.1 Chg 2., Environment, Safety, and Health Reporting (DOE 1996).« less
At the crossroads: new paradigms of food security, public health nutrition and school food.
Ashe, Leah M; Sonnino, Roberta
2013-06-01
Public health nutrition sits at the nexus of a global crisis in food, environmental and health systems that has generated - along with numerous other problems - an urgent and changing problem of food insecurity. The 'new' food insecurity, however, is different from the old: it is bimodal, encompassing issues of both under- and over-consumption, hunger and obesity, quantity and quality; it has assumed a decidedly urban dimension; and it implicates rich and poor countries alike. The complexity of the expressions of this challenge requires new approaches to public health nutrition and food policy that privilege systemic, structural and environmental factors over individual and mechanistic ones. In this context, the current paper argues that school food systems rise with buoyant potential as promising intervention sites: they are poised to address both modes of the food security crisis; integrate systemic, structural and environmental with behavioural approaches; and comprise far-reaching, system-wide efforts that influence the wider functioning of the food system. Based on a discussion of Bogotá and other pioneering policies that explicitly aim to create a broader food system with long-term foundations for good public health and food security, the paper suggests a new research and action agenda that gives special attention to school food in urban contexts.
75 FR 1070 - Cargo Securing Methods for Packages in Transport Vehicles or Freight Containers
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-08
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2009-1079] Cargo Securing Methods for... for comments. SUMMARY: The Coast Guard seeks comments from the public on methods for securing cargo in... proper condition for transportation. Currently, the specific method for securing cargo is left to the...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills, Cathy
This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is responsible for the oversight of these ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR and NTTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less
Ecological Monitoring and Compliance Program 2008 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, Dennis J.; Anderson, David C.; Hall, Derek B.
2009-04-30
The Ecological Monitoring and Compliance Program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO), monitors the ecosystem of the Nevada Test Site (NTS) and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC (NSTec), during calendar year 2008. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) monitoring ofmore » the Nonproliferation Test and Evaluation Complex (NPTEC).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boehleke, R. F.
2014-05-06
This letter serves as the post-closure inspection letter report for Corrective Action Units (CAUs) on the Nevada National Security Site for calendar year 2013. The inspections identified maintenance and repair is required at the following sites: sign and/or fence repair is necessary at CAUs 113, 137, 139, 140, 143, 262, 370, 371, 372, 374, 476, 478, 529, 542, and 560; animal burrows were identified at CAU 547; and erosion was identified at CAUs 366, 367, 383, 551, and 574. In addition, the following use restrictions were removed during 2013 and will no longer be inspected in 2014: 165, 357, andmore » 528.« less
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2013 CFR
2013-07-01
... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and...
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2014 CFR
2014-07-01
... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and...
33 CFR 105.210 - Facility personnel with security duties.
Code of Federal Regulations, 2012 CFR
2012-07-01
... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and...
Security Classification Reform: The Waiting Agenda.
ERIC Educational Resources Information Center
Relyea, Harold C.
1993-01-01
Provides an overview of security classification reform for consideration by the Clinton administration and the 103rd Congress. Historical background and current issues related to the security classification of information, personnel security clearances, and industrial safeguarding of classified information are discussed. A checklist of basic…
A review of physical security robotics at Sandia National Laboratories
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roerig, S.C.
1990-01-01
As an outgrowth of research into physical security technologies, Sandia is investigating the role of robotics in security systems. Robotics may allow more effective utilization of guard forces, especially in scenarios where personnel would be exposed to harmful environments. Robots can provide intrusion detection and assessment functions for failed sensors or transient assets, can test existing fixed site sensors, and can gather additional intelligence and dispense delaying elements. The Robotic Security Vehicle (RSV) program for DOE/OSS is developing a fieldable prototype for an exterior physical security robot based upon a commercial four wheel drive vehicle. The RSV will be capablemore » of driving itself, being driven remotely, or being driven by an onboard operator around a site and will utilize its sensors to alert an operator to unusual conditions. The Remote Security Station (RSS) program for the Defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior security systems. The RSS consists of an independent sensor pod, a mobile sensor platform and a control and display console. Sensor data fusion is used to optimize the system's intrusion detection performance. These programs are complementary, the RSV concentrates on developing autonomous mobility, while the RSS thrust is on mobile sensor employment. 3 figs.« less
Multicore Architectures for Multiple Independent Levels of Security Applications
2012-09-01
to bolster the MILS effort. However, current MILS operating systems are not designed for multi-core platforms. They do not have the hardware support...current MILS operating systems are not designed for multi‐core platforms. They do not have the hardware support to ensure that the separation...the availability of information at different security classification levels while increasing the overall security of the computing system . Due to the
The Source Physics Experiments (SPE) at the Nevada National Security Site (NNSS): An Overview
NASA Astrophysics Data System (ADS)
Snelson, C. M.; Chipman, V.; White, R. L.; Emmitt, R.; Townsend, M.; Barker, D.; Lee, P.
2012-12-01
Understanding the changes in seismic energy as it travels from the near field to the far field is the ultimate goal in monitoring for explosive events of interest. This requires a clear understanding of explosion phenomenology as it relates to seismic, infrasound, and acoustic signals. Although there has been much progress in modeling these phenomena, this has been primarily based in the empirical realm. As a result, the logical next step in advancing the seismic monitoring capability of the United States is to conduct field tests that can expand the predictive capability of the physics-based modeling currently under development. The Source Physics Experiment at the Nevada National Security Site (SPE) is the first step in this endeavor to link the empirically based with the physics-based modeling. This is a collaborative project between National Security Technologies (NSTec), Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory (LANL), Sandia National Laboratories (SNL), the Defense Threat Reduction Agency (DTRA), and the Air Force Technical Applications Center (AFTAC). The test series require both the simple and complex cases to fully characterize the problem, which is to understand the transition of seismic energy from the near field to the far field; to understand the development of S-waves in explosives sources; and how anisotropy controls seismic energy transmission and partitioning. The current series is being conducted in a granite body called the Climax Stock. This location was chosen for several reasons, including the fairly homogenous granite; the location of previous nuclear tests in the same rock body; and generally the geology has been well characterized. The simple geology series is planned for 7 shots using conventional explosives in the same shot hole surrounded by Continuous Reflectometry for Radius vs. Time Experiment (CORRTEX), Time of Arrival (TOA), Velocity of Detonation (VOD), down-hole accelerometers, surface accelerometers, infrasound, and a suite of seismic sensors of various frequency bands from the near field to the far field. This allows for the use of a single test bed in the simple geology case instead of multiple tests beds to obtain the same results. The shots are planned at various depths to obtain a Green's function, scaled-depth of burial data, nominal depth of burial data and damage zone data. SPE1 was conducted in May 2011 as a 220 lb (100 kg) TNT equivalent calibration shot at a depth of 180 ft (55 m). SPE2 was conducted in October 2011 as a 2200 lb (1000 kg) TNT equivalent calibration shot at a depth of 150 ft (46 m). SPE3 was conducted in July 2012 as a 2200 lb (1000 kg) TNT equivalent calibration shot at a depth of 150 ft (46 m) in the damaged zone. Over 400 data channels were recorded for each of these shots and data recovery was about 95% with high signal to noise ratio. Once the simple geology site data has been utilized, a new test bed will be developed in a complex geology site to test these physics based models. Ultimately, the results from this project will provide the next advances in the science of monitoring to enable a physics-based predicative capability. This work was done by National Security Technologies, LLC, under Contract No. DE-AC52-06NA25946 with the U.S. Department of Energy. DOE/NV/25946--1584
46 CFR 160.151-49 - Approval of servicing facilities at remote sites.
Code of Federal Regulations, 2011 CFR
2011-10-01
... remote site, equipment needed for repair does not need to be available at that site. A facility must be... 46 Shipping 6 2011-10-01 2011-10-01 false Approval of servicing facilities at remote sites. 160.151-49 Section 160.151-49 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT...
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
17 CFR 249.308 - Form 8-K, for current reports.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form 8-K, for current reports... Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.308 Form 8-K, for current... Note: For Federal Register citations affecting Form 8-K, see the List of CFR Sections Affected, which...
17 CFR 249.308 - Form 8-K, for current reports.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form 8-K, for current reports... Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.308 Form 8-K, for current... Note: For Federal Register citations affecting Form 8-K, see the List of CFR Sections Affected, which...
17 CFR 249.308 - Form 8-K, for current reports.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 8-K, for current reports... Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.308 Form 8-K, for current... Note: For Federal Register citations affecting Form 8-K, see the List of CFR Sections Affected, which...
17 CFR 249.308 - Form 8-K, for current reports.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form 8-K, for current reports... Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.308 Form 8-K, for current... Note: For Federal Register citations affecting Form 8-K, see the List of CFR Sections Affected, which...
17 CFR 249.308 - Form 8-K, for current reports.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form 8-K, for current reports... Under Sections 13 and 15(d) of the Securities Exchange Act of 1934 § 249.308 Form 8-K, for current... Note: For Federal Register citations affecting Form 8-K, see the List of CFR Sections Affected, which...
33 CFR 104.220 - Company or vessel personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Techniques used to circumvent security...
33 CFR 104.220 - Company or vessel personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Techniques used to circumvent security...
Code of Federal Regulations, 2012 CFR
2012-04-01
... this section is available continuously on an Internet web site controlled by a Security Futures Product... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Notice of registration under... registered under Section 6(g) of the Act. 240.6a-4 Section 240.6a-4 Commodity and Securities Exchanges...
Code of Federal Regulations, 2011 CFR
2011-04-01
... this section is available continuously on an Internet web site controlled by a Security Futures Product... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Notice of registration under... registered under Section 6(g) of the Act. 240.6a-4 Section 240.6a-4 Commodity and Securities Exchanges...
Genesis: A Framework for Achieving Software Component Diversity
2007-01-01
correctly—the initial filters develop to fix the Hotmail vulnerability could be circumvented by using alternate character encodings4. Hence, we focus on...Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo, (March 2004); http://www.greymagic.com/security/advisories/gm005-mc/. 4...EyeonSecurity, Microsoft Passport Account Hijack Attack: Hacking Hotmail and More, Hacker’s Digest. 5. Y.-W. Huang et al., Web Application Security Assessment by
Safety and security of radioactive sources in industrial radiography in Bangladesh
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mollah, A. S.; Nazrul, M. Abdullah
2013-07-01
Malicious use of radioactive sources can involve dispersal of that material through an explosive device. There has been recognition of the threat posed by the potential malicious misuse of NDT radioactive source by terrorists. The dispersal of radioactive material using conventional explosives, referred to as a 'dirty bomb', could create considerable panic, disruption and area access denial in an urban environment. However, as it is still a relatively new topic among regulators, users, and transport and storage operators worldwide, international assistance and cooperation in developing the necessary regulatory and security infrastructure is required. The most important action in reducing themore » risk of radiological terrorism is to increase the security of radioactive sources. This paper presents safety and security considerations for the transport and site storage of the industrial radiography sources as per national regulations entitled 'Nuclear Safety and Radiation Control Rules-1997'.The main emphasis was put on the stages of some safety and security actions in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport and site storage of radioactive sources used in the practice of industrial radiography. (authors)« less
Security Shift in Future Network Architectures
2010-11-01
RTO-MP-IST-091 2 - 1 Security Shift in Future Network Architectures Tim Hartog, M.Sc Information Security Dept. TNO Information and...current practice military communication infrastructures are deployed as stand-alone networked information systems. Network -Enabled Capabilities (NEC) and...information architects and security specialists about the separation of network and information security, the consequences of this shift and our view
Betancourt, Theresa S.; Zuilkowski, Stephanie S.; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T.
2015-01-01
Background The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). Methods The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Results Field testing in two diverse sites in India—a construction site and a railway station—revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues. PMID:26540159
Betancourt, Theresa S; Zuilkowski, Stephanie S; Ravichandran, Arathi; Einhorn, Honora; Arora, Nikita; Bhattacharya Chakravarty, Aruna; Brennan, Robert T
2015-01-01
The child protection community is increasingly focused on developing tools to assess threats to child protection and the basic security needs and rights of children and families living in adverse circumstances. Although tremendous advances have been made to improve measurement of individual child health status or household functioning for use in low-resource settings, little attention has been paid to a more diverse array of settings in which many children in adversity spend time and how context contributes to threats to child protection. The SAFE model posits that insecurity in any of the following fundamental domains threatens security in the others: Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security. Site-level tools are needed in order to monitor the conditions that can dramatically undermine or support healthy child growth, development and emotional and behavioral health. From refugee camps and orphanages to schools and housing complexes, site-level threats exist that are not well captured by commonly used measures of child health and well-being or assessments of single households (e.g., SDQ, HOME). The present study presents a methodology and the development of a scale for assessing site-level child protection threats in various settings of adversity. A modified Delphi panel process was enhanced with two stages of expert review in core content areas as well as review by experts in instrument development, and field pilot testing. Field testing in two diverse sites in India-a construction site and a railway station-revealed that the resulting SAFE instrument was sensitive to the differences between the sites from the standpoint of core child protection issues.
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
28 CFR 105.27 - Miscellaneous provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 105.27 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) CRIMINAL HISTORY BACKGROUND CHECKS... national fingerprint-based criminal history checks of prospective and current private security officers and... history checks of prospective and current private security officers. (b) FBI fees for national check. The...
75 FR 2445 - Chemical Facility Anti-Terrorism Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... Homeland Security EPA--Environmental Protection Agency RMP--Risk Management Program SSP--Site Security Plan...) under the Clean Air Act's Risk Management Program (RMP) for counting-- or excluding--flammable chemicals... of flammable chemicals in gasoline from the RMP rules was mandated by the Chemical Safety...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-04
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0077] Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS), Science and Technology, External S&T Collaboration Site (E-STCS) AGENCY: Science and Technology...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2012 CFR
2012-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2010 CFR
2010-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2013 CFR
2013-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2011 CFR
2011-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
28 CFR 25.8 - System safeguards.
Code of Federal Regulations, 2014 CFR
2014-07-01
... justice agency computer site must have adequate physical security to protect against any unauthorized... Index is stored electronically for use in an FBI computer environment. The NICS central computer will... authorized personnel who have identified themselves and their need for access to a system security officer...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carle, Steven F.
2011-05-04
This report describes the development, processes, and results of a hydrologic source term (HST) model for the CLEARWATER (U12q) and WINESKIN (U12r) tests located on Rainier Mesa, Nevada National Security Site, Nevada (Figure 1.1). Of the 61 underground tests (involving 62 unique detonations) conducted on Rainier Mesa (Area 12) between 1957 and 1992 (USDOE, 2015), the CLEARWATER and WINESKIN tests present many unique features that warrant a separate HST modeling effort from other Rainier Mesa tests.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthews, Patrick
2013-09-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 105: Area 2 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. CAU 105 comprises the following five corrective action sites (CASs): -02-23-04 Atmospheric Test Site - Whitney Closure In Place -02-23-05 Atmospheric Test Site T-2A Closure In Place -02-23-06 Atmospheric Test Site T-2B Clean Closure -02-23-08 Atmospheric Test Site T-2 Closure In Place -02-23-09 Atmospheric Test Site - Turk Closure In Place The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that nomore » further corrective action is needed for CAU 105 based on the implementation of the corrective actions. Corrective action investigation (CAI) activities were performed from October 22, 2012, through May 23, 2013, as set forth in the Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites; and in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farnham, Irene
This corrective action decision document (CADD)/corrective action plan (CAP) has been prepared for Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, Nevada National Security Site (NNSS), Nevada. The Yucca Flat/Climax Mine CAU is located in the northeastern portion of the NNSS and comprises 720 corrective action sites. A total of 747 underground nuclear detonations took place within this CAU between 1957 and 1992 and resulted in the release of radionuclides (RNs) in the subsurface in the vicinity of the test cavities. The CADD portion describes the Yucca Flat/Climax Mine CAU data-collection and modeling activities completed during the corrective action investigationmore » (CAI) stage, presents the corrective action objectives, and describes the actions recommended to meet the objectives. The CAP portion describes the corrective action implementation plan. The CAP presents CAU regulatory boundary objectives and initial use-restriction boundaries identified and negotiated by DOE and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the groundwater flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The UGTA strategy assumes that active remediation of subsurface RN contamination is not feasible with current technology. As a result, the corrective action is based on a combination of characterization and modeling studies, monitoring, and institutional controls. The strategy is implemented through a four-stage approach that comprises the following: (1) corrective action investigation plan (CAIP), (2) CAI, (3) CADD/CAP, and (4) closure report (CR) stages.« less
Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.
Schoenfisch, Ashley L; Pompeii, Lisa A
2016-06-27
Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).
33 CFR 106.215 - Company or OCS facility personnel with security duties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Recognition of techniques used to circumvent security...
33 CFR 106.215 - Company or OCS facility personnel with security duties.
Code of Federal Regulations, 2010 CFR
2010-07-01
... appropriate: (a) Knowledge of current and anticipated security threats and patterns. (b) Recognition and detection of dangerous substances and devices; (c) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; (d) Recognition of techniques used to circumvent security...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bechtel Nevada
The Ecological Monitoring and Compliance program, funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, monitors the ecosystem of the Nevada Test Site and ensures compliance with laws and regulations pertaining to Nevada Test Site biota. This report summarizes the program's activities conducted by Bechtel Nevada during fiscal year 2003.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... Foods, Allied Barton Security, ASIL, ASML and Construction Mechanical Systems Arlington, TX; Amended... leased workers from ASML and Construction Mechanical Systems were employed on-site at the Arlington... Department is amending the certification to include workers leased from ASML and Construction Mechanical...
12 CFR 155.310 - How do I notify the OCC?
Code of Federal Regulations, 2014 CFR
2014-01-01
... least 30 days before you establish a transactional Web site. The notice must do three things: (a) Describe the transactional web site. (b) Indicate the date the transactional web site will become operational. (c) List a contact familiar with the deployment, operation, and security of the transactional web...
12 CFR 390.222 - How do I notify FDIC?
Code of Federal Regulations, 2013 CFR
2013-01-01
... 30 days before you establish a transactional Web site. The notice must do three things: (1) Describe the transactional Web site. (2) Indicate the date the transactional Web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional Web...
12 CFR 390.222 - How do I notify FDIC?
Code of Federal Regulations, 2012 CFR
2012-01-01
... 30 days before you establish a transactional Web site. The notice must do three things: (1) Describe the transactional Web site. (2) Indicate the date the transactional Web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional Web...
12 CFR 155.310 - How do I notify the OCC?
Code of Federal Regulations, 2013 CFR
2013-01-01
... least 30 days before you establish a transactional Web site. The notice must do three things: (a) Describe the transactional web site. (b) Indicate the date the transactional web site will become operational. (c) List a contact familiar with the deployment, operation, and security of the transactional web...
12 CFR 390.222 - How do I notify FDIC?
Code of Federal Regulations, 2014 CFR
2014-01-01
... 30 days before you establish a transactional Web site. The notice must do three things: (1) Describe the transactional Web site. (2) Indicate the date the transactional Web site will become operational. (3) List a contact familiar with the deployment, operation, and security of the transactional Web...
12 CFR 155.310 - How do I notify the OCC?
Code of Federal Regulations, 2012 CFR
2012-01-01
... least 30 days before you establish a transactional Web site. The notice must do three things: (a) Describe the transactional web site. (b) Indicate the date the transactional web site will become operational. (c) List a contact familiar with the deployment, operation, and security of the transactional web...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agogino, Karen; Sanchez, Rebecca
Tonopah Test Range (TTR) in Nevada and Kauai Test Facility (KTF) in Hawaii are government-owned, contractor-operated facilities operated by Sandia Corporation (Sandia), a wholly owned subsidiary of Lockheed Martin Corporation. The U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA), through the Sandia Site Offi ce (SSO), in Albuquerque, NM, administers the contract and oversees contractor operations at TTR and KTF. Sandia manages and conducts operations at TTR in support of the DOE/NNSA’s Weapons Ordnance Program and has operated the site since 1957. Washington Group International subcontracts to Sandia in administering most of the environmental programs at TTR. Sandia operatesmore » KTF as a rocket preparation launching and tracking facility. This Annual Site Environmental Report (ASER) summarizes data and the compliance status of the environmental protection and monitoring program at TTR and KTF through Calendar Year (CY) 2007. The compliance status of environmental regulations applicable at these sites include state and federal regulations governing air emissions, wastewater effluent, waste management, terrestrial surveillance, and Environmental Restoration (ER) cleanup activities. Sandia is responsible only for those environmental program activities related to its operations. The DOE/NNSA/Nevada Site Offi ce (NSO) retains responsibility for the cleanup and management of ER TTR sites. Currently, there are no ER Sites at KTF. Environmental monitoring and surveillance programs are required by DOE Order 450.1, Environmental Protection Program (DOE 2007a) and DOE Manual 231.1-1A, Environment, Safety, and Health Reporting Manual (DOE 2007).« less
Network Access Control List Situation Awareness
ERIC Educational Resources Information Center
Reifers, Andrew
2010-01-01
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Lawrence Livermore National Laboratory Environmental Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, Henry E.; Armstrong, Dave; Blake, Rick G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2012 the Laboratory had a staff of approximately 7000.« less
Lawrence Livermore National Laboratory Environmental Report 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jones, H. E.; Bertoldo, N. A.; Blake, R. G.
Lawrence Livermore National Laboratory (LLNL) is a premier research laboratory that is part of the National Nuclear Security Administration (NNSA) within the U.S. Department of Energy (DOE). As a national security laboratory, LLNL is responsible for ensuring that the nation’s nuclear weapons remain safe, secure, and reliable. The Laboratory also meets other pressing national security needs, including countering the proliferation of weapons of mass destruction and strengthening homeland security, and conducting major research in atmospheric, earth, and energy sciences; bioscience and biotechnology; and engineering, basic science, and advanced technology. The Laboratory is managed and operated by Lawrence Livermore National Security,more » LLC (LLNS), and serves as a scientific resource to the U.S. government and a partner to industry and academia. LLNL operations have the potential to release a variety of constituents into the environment via atmospheric, surface water, and groundwater pathways. Some of the constituents, such as particles from diesel engines, are common at many types of facilities while others, such as radionuclides, are unique to research facilities like LLNL. All releases are highly regulated and carefully monitored. LLNL strives to maintain a safe, secure and efficient operational environment for its employees and neighboring communities. Experts in environment, safety and health (ES&H) support all Laboratory activities. LLNL’s radiological control program ensures that radiological exposures and releases are reduced to as low as reasonably achievable to protect the health and safety of its employees, contractors, the public, and the environment. LLNL is committed to enhancing its environmental stewardship and managing the impacts its operations may have on the environment through a formal Environmental Management System. The Laboratory encourages the public to participate in matters related to the Laboratory’s environmental impact on the community by soliciting citizens’ input on matters of significant public interest and through various communications. The Laboratory also provides public access to information on its ES&H activities. LLNL consists of two sites—an urban site in Livermore, California, referred to as the “Livermore Site,” which occupies 1.3 square miles; and a rural Experimental Test Site, referred to as “Site 300,” near Tracy, California, which occupies 10.9 square miles. In 2013 the Laboratory had a staff of approximately 6,300.« less
A Fast lattice-based polynomial digital signature system for m-commerce
NASA Astrophysics Data System (ADS)
Wei, Xinzhou; Leung, Lin; Anshel, Michael
2003-01-01
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
20 CFR 401.45 - Verifying your identity.
Code of Federal Regulations, 2010 CFR
2010-04-01
....45 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF OFFICIAL RECORDS AND... online access option, such as a standard e-mail comment form on our Web site, and encryption is not being used, we alert you that personally identifiable information (such as your social security number...
20 CFR 401.45 - Verifying your identity.
Code of Federal Regulations, 2011 CFR
2011-04-01
....45 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF OFFICIAL RECORDS AND... online access option, such as a standard e-mail comment form on our Web site, and encryption is not being used, we alert you that personally identifiable information (such as your social security number...
Department of Defense Intelligence Information System (DoDIIS). Instructions 2000
2000-02-01
DIA, November 1993, DoDIIS Site Certifier’s Guide, SC-2610-143-93. e) DIA, June 1995, DoDIIS Security Architecture Guidance and Directions ( SAGD ), Draft...Plan S&T Scientific & Technical SAGD Security Architecture Guidance and Directions SBU Sensitive But Unclassified SCI Sensitive Compartmented
76 FR 28964 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
...' Social Security Number (SSN).'' * * * * * Retrievability: Delete entry and replace with ``Name, date of... site--The eMarine system is a protected network that will employ data encryption, data masking, secure virtual private network (VPN) and DoD approved methods for safeguarding and ensuring compliance. The...
Y-12 Sustainability and Stewardship
John Krueger
2017-12-09
The Y-12 National Security Complex recently won a White House award for its leadership among Government installations for pollution prevention. This video tells the story of the many actions taken by this NNSA National Security Enterprise site towards being a responsible environmental citizen while protecting the national interest.
Y-12 Sustainability and Stewardship
DOE Office of Scientific and Technical Information (OSTI.GOV)
John Krueger
2009-10-06
The Y-12 National Security Complex recently won a White House award for its leadership among Government installations for pollution prevention. This video tells the story of the many actions taken by this NNSA National Security Enterprise site towards being a responsible environmental citizen while protecting the national interest.
27 CFR 25.98 - Surety or security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... coverage. Bonds required by this part will be given with corporate surety or collateral security. (b... limitations set forth for corporate security by the Secretary which are set forth in the current revision of... penal sum of the bond. (e) Deposit of collateral securities in lieu of corporate surety. Bonds or notes...
27 CFR 25.98 - Surety or security.
Code of Federal Regulations, 2013 CFR
2013-04-01
... coverage. Bonds required by this part will be given with corporate surety or collateral security. (b... limitations set forth for corporate security by the Secretary which are set forth in the current revision of... penal sum of the bond. (e) Deposit of collateral securities in lieu of corporate surety. Bonds or notes...
27 CFR 25.98 - Surety or security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... coverage. Bonds required by this part will be given with corporate surety or collateral security. (b... limitations set forth for corporate security by the Secretary which are set forth in the current revision of... penal sum of the bond. (e) Deposit of collateral securities in lieu of corporate surety. Bonds or notes...
27 CFR 25.98 - Surety or security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... coverage. Bonds required by this part will be given with corporate surety or collateral security. (b... limitations set forth for corporate security by the Secretary which are set forth in the current revision of... penal sum of the bond. (e) Deposit of collateral securities in lieu of corporate surety. Bonds or notes...
27 CFR 25.98 - Surety or security.
Code of Federal Regulations, 2014 CFR
2014-04-01
... coverage. Bonds required by this part will be given with corporate surety or collateral security. (b... limitations set forth for corporate security by the Secretary which are set forth in the current revision of... penal sum of the bond. (e) Deposit of collateral securities in lieu of corporate surety. Bonds or notes...
Security, Extremism and Education: Safeguarding or Surveillance?
ERIC Educational Resources Information Center
Davies, Lynn
2016-01-01
This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…
Effectiveness of the Civil Aviation Security Program.
1979-12-05
The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized
Effectiveness of the Civil Aviation Security Program.
1977-04-05
diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more
A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drollinger, Harold; Holz, Barbara A.; Bullard, Thomas F.
2014-01-01
This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types ofmore » experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the summer of 2011. It was discovered that major modifications to the terrain have resulted from four principal activities. These are road construction and maintenance, mining activities related to development of the tunnel complex, site preparation for activities related to the tests and experiments, and construction of drill pads and retention ponds. Six large trenches for exploring across the Boundary geologic fault are also present. The U15 Complex, designated historic district 143 and site 26NY15177, is eligible to the National Register of Historic Places under Criteria A, C, and D of 36 CFR Part 60.4. As a historic district and archaeological site eligible to the National Register of Historic Places, the Desert Research Institute recommends that the area defined for the U15 Complex, historic district 143 and site 26NY15117, be left in place in its current condition. The U15 Complex should also be included in the NNSS cultural resources monitoring program and monitored for disturbances or alterations.« less
A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada
DOE Office of Scientific and Technical Information (OSTI.GOV)
Drollinger, Harold; Holz, Barbara A.; Bullard, Thomas F.
2014-01-09
This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types ofmore » experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the summer of 2011. It was discovered that major modifications to the terrain have resulted from four principal activities. These are road construction and maintenance, mining activities related to development of the tunnel complex, site preparation for activities related to the tests and experiments, and construction of drill pads and retention ponds. Six large trenches for exploring across the Boundary geologic fault are also present. The U15 Complex, designated historic district 143 and site 26NY15177, is eligible to the National Register of Historic Places under Criteria A, C, and D of 36 CFR Part 60.4. As a historic district and archaeological site eligible to the National Register of Historic Places, the Desert Research Institute recommends that the area defined for the U15 Complex, historic district 143 and site 26NY15117, be left in place in its current condition. The U15 Complex should also be included in the NNSS cultural resources monitoring program and monitored for disturbances or alterations.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Irene Farnham
This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurancemore » Project Plan, Nevada Test Site, Nevada, Revision 4.« less
NATO Transformation and Operational Support in the Canadian Forces: Part 1: The Political Dimension
2010-11-01
David Rudd; DRDC CORA TR 2010-244; R & D pour la défense Canada –CARO; Novembre 2010. Contexte: L’Organisation du Traité de l’Atlantique Nord (OTAN...Alliance as a tool through which it pursues a globalized security strategy. 13 At the 2010 Munich Conference on Security Policy, Defense Secretary... 13 National Security Strategy May 2010, p. 41. http://www.whitehouse.gov/sites/default/files
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shott, G.; Yucel, V.; Desotell, L.
2006-07-01
The long-term safety of U.S. Department of Energy (DOE) low-level radioactive disposal facilities is assessed by conducting a performance assessment -- a systematic analysis that compares estimated risks to the public and the environment with performance objectives contained in DOE Manual 435.1-1, Radioactive Waste Management Manual. Before site operations, facilities design features such as final inventory, waste form characteristics, and closure cover design may be uncertain. Site operators need a modeling tool that can be used throughout the operational life of the disposal site to guide decisions regarding the acceptance of problematic waste streams, new disposal cell design, environmental monitoringmore » program design, and final site closure. In response to these needs the National Nuclear Security Administration Nevada Site Office (NNSA/NSO) has developed a decision support system for the Area 5 Radioactive Waste Management Site in Frenchman Flat on the Nevada Test Site. The core of the system is a probabilistic inventory and performance assessment model implemented in the GoldSim{sup R} simulation platform. The modeling platform supports multiple graphic capabilities that allow clear documentation of the model data sources, conceptual model, mathematical implementation, and results. The combined models have the capability to estimate disposal site inventory, contaminant concentrations in environmental media, and radiological doses to members of the public engaged in various activities at multiple locations. The model allows rapid assessment and documentation of the consequences of waste management decisions using the most current site characterization information, radionuclide inventory, and conceptual model. The model is routinely used to provide annual updates of site performance, evaluate the consequences of disposal of new waste streams, develop waste concentration limits, optimize the design of new disposal cells, and assess the adequacy of environmental monitoring programs. (authors)« less
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
1999-02-01
Actions to Study Responsibilities and Funding for Airport Security and to Certify Screening Companies DISTRIBUTION STATEMENT A Approved for...local law enforcement support relating to air carrier and airport security measures. The funding of the security operations is divided among FAA, the...generally agreed with the current division of airport security responsibilities. These officials stated that the continuity of screening would be
Locating bomb factories by detecting hydrogen peroxide.
Romolo, Francesco Saverio; Connell, Samantha; Ferrari, Carlotta; Suarez, Guillaume; Sauvain, Jean-Jacques; Hopf, Nancy B
2016-11-01
The analytical capability to detect hydrogen peroxide vapour can play a key role in localizing a site where a H2O2 based Improvised Explosive (IE) is manufactured. In security activities it is very important to obtain information in a short time. For this reason, an analytical method to be used in security activity needs portable devices. The authors have developed the first analytical method based on a portable luminometer, specifically designed and validated to locate IE manufacturing sites using quantitative on-site vapour analysis for H2O2. The method was tested both indoor and outdoor. The results demonstrate that the detection of H2O2 vapours could allow police forces to locate the site, while terrorists are preparing an attack. The collected data are also very important in developing new sensors, able to give an early alarm if located at a proper distance from a site where an H2O2 based IE is prepared. Copyright © 2016 Elsevier B.V. All rights reserved.
Case Study: An Ethics Case Study of HIV Prevention Research on Facebook: The Just/Us Study
Breslin, Lindsey T.; Wright, Erin E.; Black, Sandra R.; Levine, Deborah; Santelli, John S.
2011-01-01
Objective To consider issues related to research with youth on social networking sites online. Methods Description of the data collection process from 1,588 participants in a randomized controlled trial testing the efficacy of HIV prevention education delivered on Facebook. Using respondent-driven sampling, staff-recruited participants are encouraged to recruit up to three friends to enroll in the study. Results Researchers should (a) consider whether an online social networking site is an appropriate place to implement a research study; (b) offer opportunities to review informed consent documents at multiple times and in multiple locations throughout the study; and (c) collect data outside the social networking site and store it behind secure firewalls to ensure it will not be accessible to any person on the social networking site. Conclusions Online social networks are growing in popularity. Conducting research on social media sites requires deliberate attention to consent, confidentiality, and security. PMID:21292724
75 FR 49233 - Amendments to Form ADV
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-12
...The Securities and Exchange Commission is adopting amendments to Part 2 of Form ADV, and related rules under the Investment Advisers Act, to require investment advisers registered with us to provide new and prospective clients with a brochure and brochure supplements written in plain English. These amendments are designed to provide new and prospective advisory clients with clearly written, meaningful, current disclosure of the business practices, conflicts of interest and background of the investment adviser and its advisory personnel. Advisers must file their brochures with us electronically and we will make them available to the public through our Web site. The Commission also is withdrawing the Advisers Act rule requiring advisers to disclose certain disciplinary and financial information.
48 CFR 52.222-54 - Employment Eligibility Verification.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) or the Social Security Administration (SSA) may terminate the Contractor's MOU and deny access to the... determines not to suspend or debar the Contractor, then the Contractor must reenroll in E-Verify. (c) Web... at the Department of Homeland Security Web site: http://www.dhs.gov/E-Verify. (d) Individuals...
48 CFR 52.222-54 - Employment Eligibility Verification.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) or the Social Security Administration (SSA) may terminate the Contractor's MOU and deny access to the... determines not to suspend or debar the Contractor, then the Contractor must reenroll in E-Verify. (c) Web... at the Department of Homeland Security Web site: http://www.dhs.gov/E-Verify. (d) Individuals...
78 FR 63159 - Amendment to Certification of Nebraska's Central Filing System
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... system for Nebraska to permit the conversion of all debtor social security and taxpayer identification... automatically convert social security numbers and taxpayer identification numbers into ten number unique... certified central filing systems is available through the Internet on the GIPSA Web site ( http://www.gipsa...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-27
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0013] Agency Information Collection... request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to... formation of online communities. All users are required to authenticate prior to entering the site. In...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0028] Agency Information Collection... request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to... formation of online communities. All users are required to authenticate prior to entering the site. In...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-13
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0042] Agency Information Collection... request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to... formation of online communities. All users are required to authenticate prior to entering the site. In...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
30 CFR 250.1205 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... security? You must: (1) Protect Federal production against production loss or theft; (2) Post a sign at... Supervisor as soon as possible, but no later than the next business day after discovery: (i) Theft or... on lines leaving a royalty or inventory storage tank, including load-out line valves, drain-line...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-17
... Contract Services, Encore, International Business Machines (IBM), Akzo Nobel, US Security, ASF Logistics... Services, Encore, International Business Machines (IBM), Akzo Nobel, US Security, ASF Logistics, LLC... class 4-8 trucks. The company reports that workers leased from Encore, International Business Machines...
77 FR 1971 - Supplemental Security Income and Homeless Individuals
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-12
... these individuals (nearly 80 percent) spent time only in an emergency shelter.\\2\\ \\1\\ United States...-- Internet, fax, or mail. Do not submit the same comments multiple times or by more than one method... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY...
ERIC Educational Resources Information Center
Waters, John K.
2009-01-01
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Multiple-Feature Extracting Modules Based Leak Mining System Design
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing. PMID:24453892
Multiple-feature extracting modules based leak mining system design.
Cho, Ying-Chiang; Pan, Jen-Yi
2013-01-01
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.
Quantum tagging for tags containing secret classical data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian
Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less
Wood, David B.
2007-11-01
Between 1951 and 1992, 828 underground tests were conducted on the Nevada National Security Site, Nye County, Nevada. Prior to and following these nuclear tests, holes were drilled and mined to collect rock samples. These samples are organized and stored by depth of borehole or drift at the U.S. Geological Survey Core Library and Data Center at Mercury, Nevada, on the Nevada National Security Site. From these rock samples, rock properties were analyzed and interpreted and compiled into project files and in published reports that are maintained at the Core Library and at the U.S. Geological Survey office in Henderson, Nevada. These rock-sample data include lithologic descriptions, physical and mechanical properties, and fracture characteristics. Hydraulic properties also were compiled from holes completed in the water table. Rock samples are irreplaceable because pre-test, in-place conditions cannot be recreated and samples can not be recollected from the many holes destroyed by testing. Documenting these data in a published report will ensure availability for future investigators.
Measuring Human Performance within Computer Security Incident Response Teams
DOE Office of Scientific and Technical Information (OSTI.GOV)
McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel
Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-26
... Operations, Inc., Including On-Site Leased Workers From Reliable Temp Services, Inc., Johnson & Hill Staffing... Golf Ball Operations, Inc., including on-site leased workers from Reliable Temp Services, Inc., and... Reliable Temp Services, Inc., Johnson & Hill Staffing and Apollo Security, Chicopee, Massachusetts, who...
Feasibility of using backscattered muons for archeological imaging
NASA Astrophysics Data System (ADS)
Bonal, N.; Preston, L. A.
2013-12-01
Use of nondestructive methods to accurately locate and characterize underground objects such as rooms and tools found at archeological sites is ideal to preserve these historic sites. High-energy cosmic ray muons are very sensitive to density variation and have been used to image volcanoes and archeological sites such as the Egyptian and Mayan pyramids. Muons are subatomic particles produced in the upper atmosphere that penetrate the earth's crust up to few kilometers. Their absorption rate depends on the density of the materials through which they pass. Measurements of muon flux rate at differing directions provide density variations of the materials between the muon source (cosmic rays and neutrino interactions) and the detector, much like a CAT scan. Currently, muon tomography can resolve features to the sub-meter scale making it useful for this type of work. However, the muon detector must be placed below the target of interest. For imaging volcanoes, the upper portion is imaged when the detector is placed on the earth's surface at the volcano's base. For sites of interest beneath the ground surface, the muon detector would need to be placed below the site in a tunnel or borehole. Placing the detector underground can be costly and may disturb the historical site. We will assess the feasibility of imaging the subsurface using upward traveling muons, to eliminate the current constraint of positioning the detector below the target. This work consists of three parts 1) determine the backscattered flux rate from theory, 2) distinguish backscattered from forward scattered muons at the detector, and 3) validate the theoretical results with field experimentation. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
Script-like attachment representations in dreams containing current romantic partners.
Selterman, Dylan; Apetroaia, Adela; Waters, Everett
2012-01-01
Recent research has demonstrated parallels between romantic attachment styles and general dream content. The current study examined partner-specific attachment representations alongside dreams that contained significant others. The general prediction was that dreams would follow the "secure base script," and a general correspondence would emerge between secure attachment cognitions in waking life and in dreams. Sixty-one undergraduate student participants in committed dating relationships of six months duration or longer completed the Secure Base Script Narrative Assessment at Time 1, and then completed a dream diary for 14 consecutive days. Blind coders scored dreams that contained significant others using the same criteria for secure base content in laboratory narratives. Results revealed a significant association between relationship-specific attachment security and the degree to which dreams about romantic partners followed the secure base script. The findings illuminate our understanding of mental representations with regards to specific attachment figures. Implications for attachment theory and clinical applications are discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... lack of current and accurate information concerning the securities of Cargo Connection Logistics... Group BDC, Inc., Cargo Connection Logistics Holding, Inc., Diapulse Corporation of America, Globus... current and accurate information concerning the securities of Altus Pharmaceuticals, Inc. because it has...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-13
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Intent to Request Renewal From OMB of One Current Public Collection of Information: National Explosives Detection Canine Team.... Information Collection Requirement OMB Control Number 1652-0041; National Explosives Detection Canine Team...
7 CFR 1421.404 - Financial security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 10 2010-01-01 2010-01-01 false Financial security. 1421.404 Section 1421.404... Associations for Peanuts § 1421.404 Financial security. In order to be approved to handle loans and loan deficiency payments, the DMA must: (a) Have a current net worth ratio of at least 1:1. (b) Provide security...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
...-Laws and Rules to security futures on index-linked securities such as exchange-traded notes, which are currently traded on OneChicago, LLC. Index-linked securities are non-convertible debt of a major financial... futures contracts, one or more physical commodities, currencies or debt securities, or a combination of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... Assistance Files System of Records AGENCY: Privacy Office, Department of Homeland Security. ACTION: Notice of Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, the Department of Homeland Security proposes to update and reissue a current Department of Homeland Security system of...
7 CFR 1421.404 - Financial security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 10 2011-01-01 2011-01-01 false Financial security. 1421.404 Section 1421.404... Associations for Peanuts § 1421.404 Financial security. In order to be approved to handle loans and loan deficiency payments, the DMA must: (a) Have a current net worth ratio of at least 1:1. (b) Provide security...
Intrusion Prevention and Detection in Grid Computing - The ALICE Case
NASA Astrophysics Data System (ADS)
Gomez, Andres; Lara, Camilo; Kebschull, Udo
2015-12-01
Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.
The Concept of Comprehensive Security: A Distinctive Feature of a Shared Security Culture in Europe
2007-12-01
Sicherheitsbegriff, ed. Bundesakademie für Sicherheitspolitik (Hamburg: Mittler, 2001), 18. 92. Emil Kirchner and James Sperling , “The New Security Threats in...im 21. Jahrhundert - Keine allein militärische Aufgabe. Rede von Heidi Wegener, MdB, am 23.03.2006 im Marshall Center. www.marshallcenter.org/site...Wenger (Zürich: Forschungsstelle für Sicherheitspolitik, 2005), 11 217. Kurt R. Spillmann, " Von der bewaffneten Neutralität zur kooperativen
Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication
NASA Astrophysics Data System (ADS)
Kao, Shih-Hung; Tsai, Chia-Wei; Hwang, Tzonelih
2012-12-01
In 2010, Xiu et al. (Optics Communications 284:2065-2069, 2011) proposed several applications based on a new secure four-site distribution scheme using χ-type entangled states. This paper points out that one of these applications, namely, supervisory asymmetric deterministic secure quantum communication, is subject to an information leakage problem, in which the receiver can extract two bits of a three-bit secret message without the supervisor's permission. An enhanced protocol is proposed to resolve this problem.
Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feldman, David; Brockway, Anna M.; Ulrich, Elaine
2015-04-07
This report provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feldman, David; Brockway, Anna M.; Ulrich, Elaine
2015-04-01
This report provides a high-level overview of the current U.S. shared solar landscape and the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mark McLane
2005-03-01
This Corrective Action Decision Document (CADD) was prepared by the Defense Threat Reduction Agency (DTRA) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). The recommendations and corrective actions described within this document apply to the future closure of Corrective Action Unit (CAU) 383, Area 12 E-Tunnel Sites, which is a joint DTRA and NNSA/NSO site. The CAU consists of three (3) Corrective Action Sites (CASs): CAS 12-06-06 (Muckpile); CAS 12-25-02 (Oil Spill); and CAS 12-28-02 (Radioactive Material). In addition to these CASs, E-Tunnel Ponds One, Two, and Three, and the Drainage Area above themore » ponds were included since closure of the Muckpile will impact these areas. This CADD is consistent with the requirements of the ''Federal Facility Agreement and Consent Order'' agreed to by the State of Nevada, the U.S. Department of Energy, and the U.S. Department of Defense. The DTRA point of contact is the Nevada Operations Office, Environmental Project Manager; currently Ms. Tiffany A. Lantow. The NNSA/NSO point of contact is the Environmental Restoration, Industrial Sites Project Manager; currently Ms. Janet Appenzeller-Wing. The purpose of this CADD is to identify and provide the rationale for the selection of a recommended corrective action alternative for CAU 383. This document presents the recommended corrective action for CAU 383 (E-Tunnel Sites); however, implementation may be affected by the corrective action (to be determined) for CAU 551 (Area 12 Muckpiles) due to the close proximity of B, C, D, and F-Tunnels. The scope of this CADD consists of the following tasks: (1) Develop corrective action objectives; (2) Identify corrective action alternative screening criteria; (3) Develop corrective action alternatives; (4) Perform detailed and comparative evaluations of the corrective action alternatives in relation to the corrective action objectives and screening criteria; and (5) Recommend and justify a preferred corrective action alternative for CAU 383.« less
The ATLAS PanDA Pilot in Operation
NASA Astrophysics Data System (ADS)
Nilsson, P.; Caballero, J.; De, K.; Maeno, T.; Stradling, A.; Wenaus, T.; ATLAS Collaboration
2011-12-01
The Production and Distributed Analysis system (PanDA) [1-2] was designed to meet ATLAS [3] requirements for a data-driven workload management system capable of operating at LHC data processing scale. Submitted jobs are executed on worker nodes by pilot jobs sent to the grid sites by pilot factories. This paper provides an overview of the PanDA pilot [4] system and presents major features added in light of recent operational experience, including multi-job processing, advanced job recovery for jobs with output storage failures, gLExec [5-6] based identity switching from the generic pilot to the actual user, and other security measures. The PanDA system serves all ATLAS distributed processing and is the primary system for distributed analysis; it is currently used at over 100 sites worldwide. We analyze the performance of the pilot system in processing real LHC data on the OSG [7], EGI [8] and Nordugrid [9-10] infrastructures used by ATLAS, and describe plans for its evolution.
2008-03-01
executables. The current roadblock to detecting Type I Malware consistantly is the practice of legitimate software , such as antivirus programs, using this... Software Security Systems . . 31 3.2.2 Advantages of Hardware . . . . . . . . . . . . . 32 3.2.3 Trustworthiness of Information . . . . . . . . . 33...Towards a Hardware Security Backplane . . . . . . . . . 42 IV. Review of State of the Art Computer Security Solutions . . . . . 46 4.1 Software
What are we assessing when we measure food security? A compendium and review of current metrics.
Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L
2013-09-01
The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.
What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12
Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.
2013-01-01
The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241
Ecological Monitoring and Compliance Program 2009 Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hansen, J. Dennis; Anderson, David C.; Hall, Derek B.
The Ecological Monitoring and Compliance Program (EMAC), funded through the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, monitors the ecosystem of the Nevada Test Site and ensures compliance with laws and regulations pertaining to NTS biota. This report summarizes the program’s activities conducted by National Security Technologies, LLC, during calendar year 2009. Program activities included (a) biological surveys at proposed construction sites, (b) desert tortoise compliance, (c) ecosystem mapping and data management, (d) sensitive plant species monitoring, (e) sensitive and protected/regulated animal monitoring, (f) habitat monitoring, (g) habitat restoration monitoring, and (h) monitoring of the Nonproliferationmore » Test and Evaluation Complex. During 2009, all applicable laws, regulations, and permit requirements were met, enabling EMAC to achieve its intended goals and objectives.« less
Wood, David B.
2018-03-14
Rock samples have been collected, analyzed, and interpreted from drilling and mining operations at the Nevada National Security Site for over one-half of a century. Records containing geologic and hydrologic analyses and interpretations have been compiled into a series of databases. Rock samples have been photographed and thin sections scanned. Records and images are preserved and available for public viewing and downloading at the U.S. Geological Survey ScienceBase, Mercury Core Library and Data Center Web site at https://www.sciencebase.gov/mercury/ and documented in U.S. Geological Survey Data Series 297. Example applications of these data and images are provided in this report.
78 FR 73819 - Information Collection; Financial Information Security Request Form
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Financial Information Security... individuals and organizations on the extension with revision of a currently approved information collection, Financial Information Security Request Form. DATES: Comments must be received in writing on or before...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... DEPARTMENT OF LABOR Employee Benefits Security Administration Prohibited Transaction Exemptions... Fund; Correction AGENCY: Employee Benefits Security Administration, Department of Labor (the Department... of Exemption Determinations, Employee Benefits Security Administration, U.S. Department of Labor...
36 CFR 1600.22 - Requests for access to records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Wide Web site (which can be found at http://www.access.gpo.gov/su_docs). (c) Agreement to pay fees. If..., you may also, at your option, include your social security number. (e) Verification of guardianship... place of birth, and, at your option, the social security number of the individual; (2) Your own identity...
40 CFR 1602.2 - Requests for access to records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov/su_docs... requested records, you may also, at your option, include your social security number. (e) Verification of..., date and place of birth, and, at your option, the social security number of the individual; (2) Your...
36 CFR 1600.22 - Requests for access to records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Wide Web site (which can be found at http://www.access.gpo.gov/su_docs). (c) Agreement to pay fees. If..., you may also, at your option, include your social security number. (e) Verification of guardianship... place of birth, and, at your option, the social security number of the individual; (2) Your own identity...
40 CFR 1602.2 - Requests for access to records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov/su_docs... requested records, you may also, at your option, include your social security number. (e) Verification of..., date and place of birth, and, at your option, the social security number of the individual; (2) Your...
Intelligence, Global Terrorism and Higher Education: Neutralising Threats or Alienating Allies?
ERIC Educational Resources Information Center
Saeed, Tania; Johnson, David
2016-01-01
The British Counter-Terrorism and Security Act 2015 appears to have drawn universities into the security apparatus of the state. Academics and administrators have been compelled to comply with measures aimed at monitoring the activities of mostly Islamic student societies. While it is not inconceivable that universities are exploited as sites for…
75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Management and Budget (OMB) for review and approval in accordance with the Paperwork Reduction Act of 1995... estimated total burden may be obtained from the RegInfo.gov Web site at http://www.reginfo.gov/public/do...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...
Is Test Security an Issue in a Multistation Clinical Assessment?--A Preliminary Study.
ERIC Educational Resources Information Center
Stillman, Paula L.; And Others
1991-01-01
A study investigated possible differences in standardized patient examination scores for three groups of undergraduate (n=176) and graduate (n=221) medical students assessed at different sites over two years. Results show no systematic change in scores over testing dates, suggesting no problems with breach of test security. (MSE)
17 CFR 162.7 - Reasonable and simple methods of opting out.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Reasonable and simple methods of opting out. 162.7 Section 162.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... electronically mailed or processed through an Internet Web site; (4) Providing a toll-free telephone number; or...
17 CFR 162.7 - Reasonable and simple methods of opting out.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Reasonable and simple methods of opting out. 162.7 Section 162.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... electronically mailed or processed through an Internet Web site; (4) Providing a toll-free telephone number; or...
17 CFR 10.22 - Complaint and notice of hearing.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Complaint and notice of hearing. 10.22 Section 10.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES... Internet web site during the period referred to in paragraph (b)(1) of this section. [41 FR 2511, Jan. 16...
17 CFR 10.22 - Complaint and notice of hearing.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Complaint and notice of hearing. 10.22 Section 10.22 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES... Internet web site during the period referred to in paragraph (b)(1) of this section. [41 FR 2511, Jan. 16...
17 CFR 162.7 - Reasonable and simple methods of opting out.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Reasonable and simple methods of opting out. 162.7 Section 162.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... electronically mailed or processed through an Internet Web site; (4) Providing a toll-free telephone number; or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-29
... following conflict of interest: Issuing or maintaining a credit rating for a security or money market... that was paid for by the issuer, sponsor, or underwriter of the security or money market instrument. 17...; Provide free and unlimited access to such password- protected Internet Web site during the applicable...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-13
... System (``FINRA ADDS'') is a secure Web site that provides a firm, by market participant identifier... generates a separate report for each data archive (Asset-Backed Securities or Corporate/Agency Debt..., 2013. For the Commission, by the Division of Trading and Markets, pursuant to delegated authority.\\11...
Weaving a Secure Web around Education: A Guide to Technology Standards and Security.
ERIC Educational Resources Information Center
National Forum on Education Statistics (ED/OERI), Washington, DC.
The purpose of this guidebook is to assist education agencies and organizations--which include state education agencies or state departments of education, school districts, and schools--in the development, maintenance, and standardization of effective Web sites. Also included is a detailed examination of the procedures necessary to provide…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...
78 FR 54756 - Extension of Expiration Dates for Two Body System Listings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-06
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2013-0039] RIN 0960-AH60 Extension of Expiration Dates for Two Body System Listings AGENCY: Social Security Administration. ACTION... national toll-free number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heberlein, L.T.; Dias, G.V.; Levitt, K.N.
1989-11-01
The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, ourmore » work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... count information for equity securities publicly available on its Web site. The text of the proposed rule change is available on FINRA's Web site at http://www.finra.org , at the principal office of FINRA... basis.\\15\\ Under the proposed rule change, FINRA would publish on its Web site the reported information...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
... the proposed rule change is available on the Exchange's Web site at www.nyse.com , at the principal... in a manner to facilitate its distribution via Web sites or mobile devices. \\4\\ See Securities... broadcasters, Web site and mobile device service providers, and others to distribute this data product to their...
Britton, Katherine E; Britton-Colonnese, Jennifer D
2017-03-01
Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.
Britton, Katherine E.; Britton-Colonnese, Jennifer D.
2017-01-01
Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients’ expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients’ physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them. PMID:28264188
NASA Astrophysics Data System (ADS)
Wada, Y.; Luan, Y.; Fischer, G.; Sun, L.; Shi, P.
2015-12-01
Forcing with the population growth and consequently increasing food requirement, food security in sub-Saharan Africa is one of the most emergent and challenging issues. The purposes of this work are 1) what's the future food requirement and their food security status in each sub-Saharan African countries? What is the distance from current and future food security status, corresponding to the food requirement, to the targeted food security status? 2) To what extent Sub-Saharan countries could meet their present and future food requirement, and whether they have potential to improve their food insecurity status on currently cultivated land? 3) Whether or, if there have, how the pressures on land resources from meeting the food requirements? To figure those questions out, we firstly use socio-economic pathways datasets, and historical food diet pattern classification to forecast the 2010-2050 food commodity and feed calories demand per country. A new food security indicator, which considered the influences of both the food energy and quality intake, was used to evaluate the food insecurity status and the distances to different targeted statuses of the specific country. The latest Global Agro-Ecological Zones (GAEZ) databases were used to estimate the current and future crop yield gap and crop potential production. For current to future scenario analysis, we considered population growth, dietary change, climate change, agricultural input level, and target food security status. Then the balance of food requirement with the current and potential crop production was analyzed for different scenarios. Land requirements were calculated for meeting those food requirements, and the pressures on land resources are evaluated. Our works are hoping to provide scientific-based evidences for policy recommendations for local government to tackle food insecurity problems in Sub-Saharan Africa.
Lessons Learned Using Fractions to Assess Risk at Petroleum Release Sites
2004-04-01
Jet Fuel Bioavailability Hydrocarbon fractions Total Petroleum Hydrocarbons Weathered petroleum Sequestration 16. SECURITY CLASSIFICATION OF: 17...requirements at sites that were contaminated with petroleum products such as gasoline, diesel fuel , jet fuel , heating oil, lubricants and used motor oils...December 2002. Four of the demonstration sites were contaminated with jet fuel (i.e., JP-4, JP-5 or JP-8). The Misawa Air Base site was contaminated with
Charbonneau, Deborah H
2016-08-01
While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.
Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports
2013-03-01
formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if
Modernizing Selection and Promotion Procedures in the State Employment Security Service Agency.
ERIC Educational Resources Information Center
Derryck, Dennis A.; Leyes, Richard
The purpose of this feasibility study was to discover the types ofselection and promotion models, strategies, and processes that must be employed if current State Employment Security Service Agency selection practices are to be made more directly relevant to the various populations currently being served. Specifically, the study sought to…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
..., performed by an independent certified public accountant, of its security service fee activities and accounts...] Intent To Request Renewal From OMB of One Current Public Collection of Information; Imposition and..., DHS. ACTION: 60-day Notice. SUMMARY: The Transportation Security Administration (TSA) invites public...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program
1991-02-01
enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane
Building a Practical Framework for Enterprise-Wide Security Management
2004-04-28
management. They have found that current efforts to manage security vulnerabilities and security risks only take an enterprise so far, with results...analyzed reports to determine the cause of the increase. Slide 5 © 2004 by Carnegie Mellon University Version 1.0 Secure IT 2004 - page 5 Attack...Nearly 1 in 5 of those surveyed reported that none of their IT staff have any formal security training. [A survey of 896 Computing Technology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butler, Nicholas; Watson, Erica E.; Wright, Kyle A.
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide from sabotage, theft or diversion. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials including high-activity sources used in medical, commercial, and research applications. There are many barriers to successful bilateral cooperation that must be overcome including language, preconceived perceptions, long distances, and different views on the threat and protection requirements. Successful cooperation is often based on relationships and building trusting relationships takes time. In the case of Mexico, GTRI first made contactmore » in 2005. The project then lost momentum and stalled. At the same time, GTRI’s cooperation with the Republic of Colombia was a resounding success resulting in the securing of forty sites; the consolidation of numerous disused/orphan sources at a secure national storage facility; and, the development of a comprehensive approach to security including, inter alia, training and sustainability. The government of Colombia also showcased this comprehensive approach to thirteen Central American and Caribbean countries at a GTRI regional security conference held in Panama in October 2004. Representatives from the Colombian government were aware of GTRI’s interest in initiating cooperation with the Government of Mexico and to facilitate this cooperation, they offered to invite their Mexican counterparts to Colombia to observe its successful cooperation with GTRI. Shortly after that visit, the Government of Mexico agreed to move forward and requested that the cooperative efforts in Mexico be performed in a tripartite manner, leveraging the skills, experience, and resources of the Colombians. As a result, 22 of Mexico’s largest radioactive sites have had security upgrades in place within 18 months of cooperation.« less
49 CFR 40.45 - What form is used to document a DOT urine collection?
Code of Federal Regulations, 2011 CFR
2011-10-01
... view this form on the Department's web site (http://www.dot.gov/ost/dapc) or the HHS web site (http... employee (other than a social security number (SSN) or other employee identification (ID) number) to a...
49 CFR 40.45 - What form is used to document a DOT urine collection?
Code of Federal Regulations, 2010 CFR
2010-10-01
... view this form on the Department's web site (http://www.dot.gov/ost/dapc) or the HHS web site (http... employee (other than a social security number (SSN) or other employee identification (ID) number) to a...
77 FR 10485 - Environmental Management Site-Specific Advisory Board, Idaho National Laboratory
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... Status EM/National Nuclear Security Administration Integration Ecological Surveys Ground Water Waste Area... and site management in the areas of environmental restoration, waste management, and related... Idaho Cleanup Project (ICP) Workforce Reductions Advanced Mixed Waste Cleanup Project (AMWTP) Workforce...
Hacking Facebook Privacy and Security
2012-08-28
that their information is somehow protected. However, practically this is not always the case and privacy on social networking sites has received...fraudsters target Facebook and other social networking sites to harvest information about you. Here’s how we recommend you set your Facebook privacy
Effectiveness of the Civil Aviation Security Program.
1977-10-31
searches. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes...revision of the regulation that established basic airport security requirements is currently underway. One of the more significant revisions under study... airport security procedures cannot be determined with certainty. Nowever, the number of firearms detected at passenger screening points under suspicious
ERIC Educational Resources Information Center
Olijnyk, Nicholas Victor
2014-01-01
The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…
Designing a Retirement System for Federal Workers Covered by Social Security.
ERIC Educational Resources Information Center
Library of Congress, Washington, DC. Congressional Research Service.
A study examined principal cost and benefit issues to be resolved in designing a new retirement system for Federal workers covered by Social Security. The new Federal system would be built on the base of Social Security and would take into account the Social Security program's taxes and benefits. The current Civil Service Retirement System (CSRS)…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-10
...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), Office of Management and Budget (OMB) control number 1652-0002, abstracted below that we will submit to OMB for renewal in compliance with the Paperwork Reduction Act (PRA). The ICR describes the nature of the information collection and its expected burden. These programs require airport operators to maintain and update records to ensure compliance with security provisions outlined in 49 CFR part 1542.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-24
...The Transportation Security Administration (TSA) invites public comment on one currently approved Information Collection Request (ICR), OMB control number 1652-0040, abstracted below that we will submit to the Office of Management and Budget (OMB) for renewal in compliance with the Paperwork Reduction Act. The ICR describes the nature of the information collection and its expected burden. This ICR involves five broad categories of affected populations: airports, passenger aircraft operators, foreign air carriers, indirect air carriers operating under a security program, and all-cargo carriers. The collections of information that make up this ICR are security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), Air Cargo Data Management System (ACDMS), Cargo Reporting Tool for cargo screening reporting, and evidence of compliance recordkeeping. TSA seeks continued OMB approval in order to secure passenger aircraft carrying cargo as authorized in the Aviation and Transportation Security Act.
Security Frameworks for Machine-to-Machine Devices and Networks
NASA Astrophysics Data System (ADS)
Demblewski, Michael
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sloop, Christy
2013-04-01
This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 569: Area 3 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. CAU 569 comprises the following nine corrective action sites (CASs): • 03-23-09, T-3 Contamination Area • 03-23-10, T-3A Contamination Area • 03-23-11, T-3B Contamination Area • 03-23-12, T-3S Contamination Area • 03-23-13, T-3T Contamination Area • 03-23-14, T-3V Contamination Area • 03-23-15, S-3G Contamination Area • 03-23-16, S-3H Contamination Area • 03-23-21, Pike Contamination Area The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supportingmore » the recommendation that no further corrective action is needed for CAU 569 based on the implementation of the corrective actions listed in Table ES-2.« less
12 CFR 703.8 - Broker-dealers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... business; (2) Information available from State or Federal securities regulators and securities industry... should consider current financial data, annual reports, reports of nationally-recognized statistical...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-21
...., 1150 18th Street NW., Suite 910, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: The RTCA... (202) 833-9434, or Web site at http://www.rtca.org . SUPPLEMENTARY INFORMATION: Pursuant to section 10... Security System Standard for Airport Access Control, RTCA Paper No. 168-13/SC224-048 TOR Review--Status of...
A Career Cluster in Law, Public Safety, Corrections and Security
ERIC Educational Resources Information Center
Reese, Susan
2007-01-01
This article describes a program at Great Plains Technology Center that is not only serving its community's needs but it is also serving as a national pilot site. When Oklahoma's Great Plains Technology Center began developing its Law, Public Safety, Corrections and Security Cluster in 2003, the National Partnership for Careers in Law, Public…
How Homeland Security Affects Spatial Information
ERIC Educational Resources Information Center
Zellmer, Linda
2004-01-01
A recent article in Security-Focus described the fact that several U.S. government buildings in Washington DC could no longer be clearly seen by people using MapQuest's aerial photo database. In addition, the photos of these buildings were altered at the Web sites wherein they are posted at the request of the U.S. Secret Service. This is an…
Site-Specific Differentiation of Fibroblasts in Normal and Scleroderma Skin
2010-06-01
SITE-SPECIFIC DIFFERENTIATION OF FIBROBLASTS IN NORMAL AND SCLERODERMA SKIN PRINCIPAL INVESTIGATOR: Howard Y. Chang, M.D., Ph.D...2010 4. TITLE AND SUBTITLE Site-Specific Differentiation of Fibroblasts in Normal and 5a. CONTRACT NUMBER Scleroderma Skin 5b. GRANT NUMBER...activated fibroblasts from SSc. 15. SUBJECT TERMS Scleroderma , fibroblasts, gene expression 16. SECURITY CLASSIFICATION OF: U 17. LIMITATION OF
2007-05-10
objective is achieved through consequence management and fixed-site decontamination operations. The effectiveness of CBRN consequence management...decontamination operations. The effectiveness of CBRN consequence management and fixed-site decontamination executed in the Joint Security Area can be...when faced with Chemical, Biological, Radiological, or Nuclear (CBRN) contaminated ports of debarkation. The effectiveness of CBRN consequence