Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... to Facility Vulnerability Assessments and the Integration of Security Systems AGENCY: Coast Guard...-sharing measures. Security System Integration Alternatives Require each MTSA-regulated facility owner or... other forms of security system integration. Information Requested 1. We request comments on the...
A security/safety survey of long term care facilities.
Acorn, Jonathan R
2010-01-01
What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.
33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (9) Security systems and equipment maintenance; (10) Security measures for access control; (11... Facility Security Plan (FSP). 106.405 Section 106.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES...
Providing security for automated process control systems at hydropower engineering facilities
NASA Astrophysics Data System (ADS)
Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.
2016-12-01
This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., including computer systems and networks; (vi) Existing agreements with private security companies; (vii) Any... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental...
Information security management system planning for CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.
1996-11-01
As the trend to mergers and diversification of healthcare facilities grows, so too does the challenge to security directors to effectively and efficiently protect not only acute care, emergency, and outpatient facilities, but physician office buildings, parking garages, long-term-care units, medical schools, technical service units, and even health clubs. Besides the different security and communications problems posed by each type of facility, the problem of distance between facilities and their geographic location must also be met. In this report, we'll update you on the approaches being taken by security and planning executives at three leading health systems and how they are dealing with current and future problems.
33 CFR 105.235 - Communications.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Communications. 105.235 Section... MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.235 Communications. (a) The Facility... conditions at the facility. (b) Communication systems and procedures must allow effective and continuous...
33 CFR 105.235 - Communications.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Communications. 105.235 Section... MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.235 Communications. (a) The Facility... conditions at the facility. (b) Communication systems and procedures must allow effective and continuous...
33 CFR 105.235 - Communications.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Communications. 105.235 Section... MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.235 Communications. (a) The Facility... conditions at the facility. (b) Communication systems and procedures must allow effective and continuous...
33 CFR 105.235 - Communications.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Communications. 105.235 Section... MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.235 Communications. (a) The Facility... conditions at the facility. (b) Communication systems and procedures must allow effective and continuous...
Secure, safe, and sensitive solutions.
Hughan, Tina
2012-04-01
Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.
A demonstration of a low cost approach to security at shipping facilities and ports
NASA Astrophysics Data System (ADS)
Huck, Robert C.; Al Akkoumi, Mouhammad K.; Herath, Ruchira W.; Sluss, James J., Jr.; Radhakrishnan, Sridhar; Landers, Thomas L.
2010-04-01
Government funding for the security at shipping facilities and ports is limited so there is a need for low cost scalable security systems. With over 20 million sea, truck, and rail containers entering the United States every year, these facilities pose a large risk to security. Securing these facilities and monitoring the variety of traffic that enter and leave is a major task. To accomplish this, the authors have developed and fielded a low cost fully distributed building block approach to port security at the inland Port of Catoosa in Oklahoma. Based on prior work accomplished in the design and fielding of an intelligent transportation system in the United States, functional building blocks, (e.g. Network, Camera, Sensor, Display, and Operator Console blocks) can be assembled, mixed and matched, and scaled to provide a comprehensive security system. The following functions are demonstrated and scaled through analysis and demonstration: Barge tracking, credential checking, container inventory, vehicle tracking, and situational awareness. The concept behind this research is "any operator on any console can control any device at any time."
33 CFR 106.255 - Security systems and equipment maintenance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... maintained according to manufacturers' recommendations. (b) Security systems must be regularly tested in... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a...
Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert
2015-07-28
Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's abilitymore » to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.« less
Secure videoconferencing equipment switching system and method
Hansen, Michael E [Livermore, CA
2009-01-13
A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung
2012-06-01
The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 127.705 - Security systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security systems. 127.705 Section 127.705 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.705 Security systems. The operator shall...
33 CFR 106.265 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...
FAA computer security : concerns remain due to personnel and other continuing weaknesses
DOT National Transportation Integrated Search
2000-08-01
FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...
Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities
Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min
2012-01-01
Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648
ERIC Educational Resources Information Center
National Bureau of Standards (DOC), Washington, DC.
These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…
How to implement security controls for an information security program at CBRN facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.
This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in anmore » easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
PALMER, M.E.
1999-09-21
Test Plan HNF-4351 defines testing requirements for installation of a new server in the WRAP Facility. This document shows the results of the test reports on the DMS-Y2K and DMS-F81 (Security) systems.
10 CFR 95.49 - Security of automatic data processing (ADP) systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...
Terrazas, Enrique; Hamill, Timothy R.; Wang, Ye; Channing Rodgers, R. P.
2007-01-01
The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components. PMID:18693930
Terrazas, Enrique; Hamill, Timothy R; Wang, Ye; Channing Rodgers, R P
2007-10-11
The Department of Laboratory Medicine at the University of California, San Francisco (UCSF) has been split into widely separated facilities, leading to much time being spent traveling between facilities for meetings. We installed an open-source AccessGrid multi-media-conferencing system using (largely) consumer-grade equipment, connecting 6 sites at 5 separate facilities. The system was accepted rapidly and enthusiastically, and was inexpensive compared to alternative approaches. Security was addressed by aspects of the AG software and by local network administrative practices. The chief obstacles to deployment arose from security restrictions imposed by multiple independent network administration regimes, requiring a drastically reduced list of network ports employed by AG components.
Nuclear Security Objectives of an NMAC System
DOE Office of Scientific and Technical Information (OSTI.GOV)
West, Rebecca Lynn
After completing this module, you should be able to: Describe the role of Nuclear Material Accounting and Control (NMAC) in comprehensive nuclear security at a facility; Describe purpose of NMAC; Identify differences between the use of NMAC for IAEA safeguards and for facility nuclear security; List NMAC elements and measures; and Describe process for resolution of irregularities
Providing security assurance in line with national DBT assumptions
NASA Astrophysics Data System (ADS)
Bajramovic, Edita; Gupta, Deeksha
2017-01-01
As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the field of physical and cyber protection. These national regulations have to be met later on by I&C platform suppliers, electrical systems suppliers, system integrators and turn-key providers.
US-CERT Control System Center Input/Output (I/O) Conceputal Design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2005-02-01
This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less
HOW TO SELECT THE PROPER SECURITY AND EQUIPMENT SURVEILLANCE SYSTEMS TO PROTECT YOUR FACILITIES.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
IN PRESENTING A SURVEY OF MODERN SECURITY SYSTEMS, THIS BOOKLET DISCUSSES THE REQUIREMENTS FOR SURVEILLANCE AND PROTECTION OF AREAS, PERIMETER, AND OBJECTS. A VARIETY OF EQUIPMENT IS DESCRIBED WITH DISCUSSION OF OPERATING PROCEDURES, COSTS, AND RECENT DEVELOPMENTS IN SECURITY SYSTEMS. (JT)
2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference
2017-11-15
beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and
Game theoretic analysis of physical protection system design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canion, B.; Schneider, E.; Bickel, E.
The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 3 2012-10-01 2012-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
49 CFR 193.2911 - Security lighting.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 3 2010-10-01 2010-10-01 false Security lighting. 193.2911 Section 193.2911...: FEDERAL SAFETY STANDARDS Security § 193.2911 Security lighting. Where security warning systems are not provided for security monitoring under § 193.2913, the area around the facilities listed under § 193.2905(a...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
33 CFR 105.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Security Assessment (FSA... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.305 Facility Security Assessment (FSA) requirements. (a) Background. The facility owner or operator must ensure...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schanfein, Mark J.; Mladineo, Stephen V.
2015-07-07
Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insidermore » who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.« less
32 CFR 223.7 - Procedures-determination of DoD UCNI.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Detection and Security Alarm Systems. (i) Information on the layout or design of security and alarm systems...) Frequency and schedule of DoD SNM inventories. (3) Facility Description. (i) Maps, conceptual design, and...
32 CFR 223.7 - Procedures-determination of DoD UCNI.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Detection and Security Alarm Systems. (i) Information on the layout or design of security and alarm systems...) Frequency and schedule of DoD SNM inventories. (3) Facility Description. (i) Maps, conceptual design, and...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2011 CFR
2011-10-01
... screening technologies that the facility is authorized to use. These include: (i) The ability to operate x-ray equipment and to distinguish on the x-ray monitor the appropriate imaging standard specified in the certified cargo screening facility security program. Wherever the x-ray system displays colors...
17 CFR 37.1400 - Core Principle 14-System safeguards.
Code of Federal Regulations, 2014 CFR
2014-04-01
... procedures, and automated systems, that: (1) Are reliable and secure; and (2) Have adequate scalable capacity... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Core Principle 14-System... SWAP EXECUTION FACILITIES System Safeguards § 37.1400 Core Principle 14—System safeguards. The swap...
Taking Steps to Protect Against the Insider Threat
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Noah Gale; Williams, Martha; Lewis, Joel
2015-10-16
Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse ofmore » equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.« less
40 CFR 267.14 - What are my security requirements?
Code of Federal Regulations, 2014 CFR
2014-07-01
... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...
40 CFR 267.14 - What are my security requirements?
Code of Federal Regulations, 2012 CFR
2012-07-01
... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...
40 CFR 267.14 - What are my security requirements?
Code of Federal Regulations, 2013 CFR
2013-07-01
... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...
40 CFR 267.14 - What are my security requirements?
Code of Federal Regulations, 2011 CFR
2011-07-01
... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... example, facilities in counties bordering the Canadian province of Quebec must post signs in French, and...
40 CFR 267.14 - What are my security requirements?
Code of Federal Regulations, 2010 CFR
2010-07-01
... facility. (b) Your facility must have: (1) A 24-hour surveillance system (for example, television... legend must be in English and in any other language predominant in the area surrounding the facility (for...
Sandia National Laboratories: National Security Missions: International
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-04
... Operations regarding a TRACE-Eligible Security when such security is not in the TRACE system, and to... using any facility or system that FINRA operates or controls.\\8\\ The fee is similar to the Computer-to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64364; File No. SR-FINRA-2011-012] Self...
Code of Federal Regulations, 2012 CFR
2012-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2011 CFR
2011-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2014 CFR
2014-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
Code of Federal Regulations, 2010 CFR
2010-04-01
... facilities shall be equipped with a security system that will provide suitable protection against theft and diversion. When appropriate, the security system shall provide protection against theft or diversion that is..., equipment, and security conditions; (3) Have a quarantine area for storage of prescription drugs that are...
33 CFR 127.1305 - Operations Manual.
Code of Federal Regulations, 2010 CFR
2010-07-01
... personnel of the facility; (e) A description for each security system provided for the transfer area; (f) A... Section 127.1305 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Operations Manual must contain— (a) A description of each liquid-transfer system and vapor transfer system...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
Security Annex Concept of Operations for the Next Generation Air Transportation System, Version 2.0
2007-06-13
AOA/ SIDA ........................................................................................................ 21 4.3.2 Terminal Perimeter...place in the following areas within these facilities as appropriate: • Airside: Security identification display area ( SIDA )/AoA, terminal perimeter...validating hypersonic aircraft clearances as they reenter the atmosphere to land at that facility. 4.3 AIRSIDE 4.3.1 AOA/ SIDA NextGen Commercial
2012-10-01
facilities, such as water supply, waste water treatment , and power generation. The Ministry of Defense’s procurement process is unable to provide the...the Joint Regional Afghanistan Security Forces Compound Water Treatment System...Ministry of Interior NTM-A North Atlantic Treaty Organization Training Mission-Afghanistan O&M operation and maintenance PCO Primary Contracting Officer
48 CFR 1337.110-70 - Personnel security processing requirements.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...
48 CFR 1337.110-70 - Personnel security processing requirements.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...
48 CFR 1337.110-70 - Personnel security processing requirements.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT OF... where foreign national access to any DOC facility or DOC IT system is required. The language of the...
Energy Systems Integration News | Energy Systems Integration Facility |
-matter experts to develop cyber-physical systems security testing methodologies and resilience best the Energy Systems Integration Facility as part of NREL's work with SolarCity and the Hawaiian Electric Companies. Photo by Amy Glickson, NREL Welcome to Energy Systems Integration News, NREL's monthly
75 FR 35508 - Draft Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...
6 CFR 37.43 - Physical security of DMV production facilities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Physical security of DMV production facilities... Identification Card Production Facilities § 37.43 Physical security of DMV production facilities. (a) States must ensure the physical security of facilities where driver's licenses and identification cards are produced...
7 CFR 1735.22 - Loan security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... telephone facilities that do not constitute self-contained operating systems or units (such as lines switched by other systems), the borrower shall, in addition to the mortgage lien on all of the borrower's... the borrower's entire system, including the facilities to be constructed with the proceeds of the loan...
7 CFR 1735.22 - Loan security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... telephone facilities that do not constitute self-contained operating systems or units (such as lines switched by other systems), the borrower shall, in addition to the mortgage lien on all of the borrower's... the borrower's entire system, including the facilities to be constructed with the proceeds of the loan...
ERIC Educational Resources Information Center
Benson, Allen C.
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
6 CFR 27.200 - Information regarding security risk for a chemical facility.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Information regarding security risk for a chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...
77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-17
... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...
Project management; considerations for success.
Maas, Jos
2013-01-01
During the past two years the author was a project leader for three Information Communication Technology (ICT) security related systems projects for a newly built healthcare facility. These projects were: a CCTV system, an Access Control system and an Identity & Access Management system. During those two years he gained experiences on how to coop with ICT projects related to security and healthcare as well as some pitfalls to be contended with along the way. With this article, he shares his experiences so that colleagues can benefit from them when they are a project leaders for their health facility and need to better decide how or how not to address their project and project issues.
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215... FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...-risk, the facility must complete a Security Vulnerability Assessment. A Security Vulnerability...
33 CFR 105.255 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...
Radiography Capabilities for Matter-Radiation Interactions in Extremes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walstrom, Peter Lowell; Garnett, Robert William; Chapman, Catherine A. B
The Matter-Radiation Interactions in Extremes (MaRIE) experimental facility will be used to discover and design the advanced materials needed to meet 21st century national security and energy security challenges. This new facility will provide the new tools scientists need to develop next-generation materials that will perform predictably and on-demand for currently unattainable lifetimes in extreme environments. The MaRIE facility is based on upgrades to the existing LANSCE 800-MeV proton linac and a new 12-GeV electron linac and associated X-ray FEL to provide simultaneous multiple probe beams, and new experimental areas. In addition to the high-energy photon probe beam, both electronmore » and proton radiography capabilities will be available at the MaRIE facility. Recently, detailed radiography system studies have been performed to develop conceptual layouts of high-magnification electron and proton radiography systems that can meet the experimental requirements for the expected first experiments to be performed at the facility. A description of the radiography systems, their performance requirements, and a proposed facility layout are presented.« less
15 CFR 700.20 - Use of priority ratings.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE NATIONAL SECURITY INDUSTRIAL BASE REGULATIONS DEFENSE PRIORITIES AND ALLOCATIONS SYSTEM Industrial Priorities for Energy Programs § 700.20 Use of... maintenance of energy facilities. ...
Cybersecurity and Resilience | Energy Systems Integration Facility | NREL
, and offer prioritized action items to improve organizational protocols. The team is also helping and provide a prioritized list of action items for gaps in security controls. Security architectures
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1983-01-01
This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.
6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security...
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2014 CFR
2014-07-01
... technology and blast standards. Immediate review of ongoing projects may generate savings in the... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2013 CFR
2013-07-01
... construction projects should be reviewed if possible, to incorporate current technology and blast standards... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2012 CFR
2012-07-01
... technology and blast standards. Immediate review of ongoing projects may generate savings in the... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
Materials and Fuels Complex Tour
Miley, Don
2017-12-11
The Materials and Fuels Complex at Idaho National Laboratory is home to several facilities used for the research and development of nuclear fuels. Stops include the Fuel Conditioning Facility, the Hot Fuel Examination Facility (post-irradiation examination), and the Space and Security Power System Facility, where radioisotope thermoelectric generators (RTGs) are assembled for deep space missions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schurman, D.L.; Datesman, G.H. Jr; Truitt, J.O.
The report presents a system for evaluating and correcting deficiencies in security-force effectiveness in licensed nuclear facilities. There are four checklists which security managers can copy directly, or can use as guidelines for developing their own checklists. The checklists are keyed to corrective-action guides found in the body of the report. In addition to the corrective-action guides, the report gives background information on the nature of security systems and discussions of various special problems of the licensed nuclear industry.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert S. Anderson; Mark Schanfein; Trond Bjornard
2011-07-01
Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less
40 CFR 280.210 - Participation in management.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or facility or property on which the UST or UST system is located, liquidate, wind up operations, and... the security interest includes all debt and costs incurred by the security interest holder, and is... value of the security interest also includes all reasonable and necessary costs, fees, or other charges...
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
NASA's Super Guppy aircraft has been closed and secured at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The Orion Exploration Mission-1 (EM-1) structural test article is secured inside the Super Guppy and will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
75 FR 14141 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-24
... electronic storage media. RETRIEVABILITY: Individual's name, Social Security Number (SSN), or date of birth... action will be effective without further notice on April 23, 2010 unless comments are received that would... facilities. CATEGORIES OF RECORDS IN THE SYSTEM: Subject individual's full name, Social Security Number (SSN...
48 CFR 42.402 - Visits to contractors' facilities.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Visits to contractors... contractors' facilities. (a) Government personnel planning to visit a contractor's facility in connection with... positions, and security clearances. (2) Date and duration of visit. (3) Name and address of contractor and...
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Payable Contract Information Construction & Facilities Contract Audit Sandia's Economic Impact
ERIC Educational Resources Information Center
National Forum on Education Statistics, 2012
2012-01-01
Safe and secure facilities that foster learning are crucial to providing quality education services, and developing and maintaining these facilities requires considerable resources and organization. Facility information systems allow education organizations to collect and manage data that can be used to inform and guide decisionmaking about the…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... Chemical Facility Safety and Security Listening Sessions AGENCY: National Protection and Programs... from stakeholders on issues pertaining to Improving Chemical Facility Safety and Security (Executive... regulations, guidance, and policies; and identifying best practices in chemical facility safety and security...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... Operating Licenses include: (1) The proposed Cyber Security Plan for CCNPP, Ginna, and NMPNS, (2) an... provisions of the Nuclear Regulatory Commission-approved Cyber Security Plan for CCNPP, Ginna, and NMPNS as... Communication Systems and Networks,'' establish the requirements for a cyber security program. This regulation...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Assessment (FSA) § 106.300 General. (a) The Facility Security Assessment (FSA) is a written document that is...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Iveson, Steven W.
Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards aremore » designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.« less
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Screening for mental health needs of New Zealand youth in secure care facilities using the MAYSI-2.
McArdle, Sean; Lambie, Ian
2018-06-01
Young people admitted to secure facilities generally have particularly high rates of mental, emotional and behavioural problems, but little is known about the mental health needs of this group in New Zealand. To describe prevalence of probable mental health disorder and related needs among young people in secure facilities in New Zealand. Massachusetts youth screening instrument - second version (MAYSI-2) data were obtained from the records of young people admitted to one secure care facility (n = 204) within a 12 month period. We used descriptive statistics to determine prevalence of problems overall and multivariate analysis of variance to compare MAYSI-2 scores between gender and ethnic groups. Nearly 80% of these young people scored above the 'caution' or 'warning' cut-off on the MAYSI-2, a substantially higher proportion than reported in studies in other countries. There was a tendency for girls and for Maori and Pacific Islander subgroups to have a higher rate of probable psychopathology. Young people in secure facilities in New Zealand have substantial service needs. Early intervention that engages them in services upon first contact with the youth justice system might help reduce this burden. Further validation of the MAYSI-2 in New Zealand may be warranted because of the unique ethnic make-up of these young offenders. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.
Emergency positioning system accuracy with infrared LEDs in high-security facilities
NASA Astrophysics Data System (ADS)
Knoch, Sierra N.; Nelson, Charles; Walker, Owens
2017-05-01
Instantaneous personnel location presents a challenge in Department of Defense applications where high levels of security restrict real-time tracking of crew members. During emergency situations, command and control requires immediate accountability of all personnel. Current radio frequency (RF) based indoor positioning systems can be unsuitable due to RF leakage and electromagnetic interference with sensitively calibrated machinery on variable platforms like ships, submarines and high-security facilities. Infrared light provide a possible solution to this problem. This paper proposes and evaluates an indoor line-of-sight positioning system that is comprised of IR and high-sensitivity CMOS camera receivers. In this system the movement of the LEDs is captured by the camera, uploaded and analyzed; the highest point of power is located and plotted to create a blueprint of crewmember location. Results provided evaluate accuracy as a function of both wavelength and environmental conditions. Research will further evaluate the accuracy of the LED transmitter and CMOS camera receiver system. Transmissions in both the 780 and 850nm IR are analyzed.
Security aspects of space operations data
NASA Technical Reports Server (NTRS)
Schmitz, Stefan
1993-01-01
This paper deals with data security. It identifies security threats to European Space Agency's (ESA) In Orbit Infrastructure Ground Segment (IOI GS) and proposes a method of dealing with its complex data structures from the security point of view. It is part of the 'Analysis of Failure Modes, Effects Hazards and Risks of the IOI GS for Operations, including Backup Facilities and Functions' carried out on behalf of the European Space Operations Center (ESOC). The security part of this analysis has been prepared with the following aspects in mind: ESA's large decentralized ground facilities for operations, the multiple organizations/users involved in the operations and the developments of ground data systems, and the large heterogeneous network structure enabling access to (sensitive) data which does involve crossing organizational boundaries. An IOI GS data objects classification is introduced to determine the extent of the necessary protection mechanisms. The proposal of security countermeasures is oriented towards the European 'Information Technology Security Evaluation Criteria (ITSEC)' whose hierarchically organized requirements can be directly mapped to the security sensitivity classification.
NASA Astrophysics Data System (ADS)
Alif, S. M.; Nugroho, A. P.; Leksono, B. E.
2018-03-01
Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.
Impacts of Vehicle (In)Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chugg, J.; Rohde, K.
Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cybermore » entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial discussion of how a vehicle can be used as a new threat vector to penetrate secure facilities will be presented. This includes how a modern automobile can be used as the exploitation mechanism for nearby devices such as laptops, cell phones, and wireless access points. Additional discussion will highlight how vehicle security might impact transportation of nuclear material through remote exploitation of a moving vehicle. The final discussion will include what possible implications might be relative to the physical protection systems at nuclear facilities. The audience will also be given details regarding the complexity of attack, thus implying the likelihood of successful exploitation, and information on how such attacks may be mitigated. Emerging security products for automobiles will be discussed and other mitigation methods will be detailed (e.g. disabling vehicle cellular modems). As a result, the audience will have a greater understanding of how to add vehicle security as a part of a comprehensive nuclear security policy.Finally, this paper will highlight the similarities between CAN Bus and other broadcast serial bus networks such as Profibus or DeviceNet, helping educate the reader on how susceptible this type of networking is to nefarious attacks and how it might affect components connected to many different nuclear systems, including control systems, safety systems, emergency systems, and support systems.« less
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Implementing an Information Security Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.
The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... facility's involvement with classified information and may include a Facility Security Officer Orientation... procedures and duties applicable to the employee's job. (g) Refresher Briefings. The licensee or other.... (j) Records reflecting an individual's initial and refresher security orientations and security...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... facility's involvement with classified information and may include a Facility Security Officer Orientation... procedures and duties applicable to the employee's job. (g) Refresher Briefings. The licensee or other.... (j) Records reflecting an individual's initial and refresher security orientations and security...
2013-03-08
applicable fire protection standards for two of the three projects we reviewed that required a fire sprinkler system . Specifically, the Secure...RSOI and Command and Control facilities do not have fire sprinkler systems as required by Unified Facilities Criteria 3-600-01, Section 4-2.2...stated that, as such, those facilities did not need fire sprinkler systems . Based on the justification provided by the Air Force on the DD Form 1391s
Cyber Security for Lighting Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
Fact sheet discusses cyber threats unique to lighting control systems in buildings and helps facility managers identify the types of lighting control systems that could introduce cybersecurity risks. Download the fact sheet.
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A
2013-10-01
This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.
Credit BG. Northeast and northwest facades of Building 4496 (Security ...
Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA
Remote video assessment for missile launch facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.; Stewart, W.A.
1995-07-01
The widely dispersed, unmanned launch facilities (LFs) for land-based ICBMs (intercontinental ballistic missiles) currently do not have visual assessment capability for existing intrusion alarms. The security response force currently must assess each alarm on-site. Remote assessment will enhance manpower, safety, and security efforts. Sandia National Laboratories was tasked by the USAF Electronic Systems Center to research, recommend, and demonstrate a cost-effective remote video assessment capability at missile LFs. The project`s charter was to provide: system concepts; market survey analysis; technology search recommendations; and operational hardware demonstrations for remote video assessment from a missile LF to a remote security center viamore » a cost-effective transmission medium and without using visible, on-site lighting. The technical challenges of this project were to: analyze various video transmission media and emphasize using the existing missile system copper line which can be as long as 30 miles; accentuate and extremely low-cost system because of the many sites requiring system installation; integrate the video assessment system with the current LF alarm system; and provide video assessment at the remote sites with non-visible lighting.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, Cynthia Lee
There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allowmore » special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal concept.« less
NASA Astrophysics Data System (ADS)
Green, Mary W.
1997-01-01
As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
NASA Astrophysics Data System (ADS)
Francisco, Glen; Brown, Todd
2012-06-01
Integrated security systems are essential to pre-empting criminal assaults. Nearly 500,000 sites have been identified (source: US DHS) as critical infrastructure sites that would suffer severe damage if a security breach should occur. One major breach in any of 123 U.S. facilities, identified as "most critical", threatens more than 1,000,000 people. The vulnerabilities of critical infrastructure are expected to continue and even heighten over the coming years.
77 FR 63849 - Facility Security Officer Training Requirements; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-17
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer Training Requirements; Correction AGENCY: Coast Guard, DHS. ACTION: Notice of public meeting; request for... comments on the development of a Facility Security Officer training program. The notice contains an...
48 CFR 1337.110-70 - Personnel security processing requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...
48 CFR 1337.110-70 - Personnel security processing requirements.
Code of Federal Regulations, 2013 CFR
2013-10-01
... COMMERCE SPECIAL CATEGORIES OF CONTRACTING SERVICE CONTRACTING Service Contracts-General 1337.110-70... processing for contractors performing services on or within a Department of Commerce facility or through an information technology (IT) system, as required by the Department of Commerce Security Manual and Department...
An SSH key management system: easing the pain of managing key/user/account associations
NASA Astrophysics Data System (ADS)
Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.
2008-07-01
Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.
Regulation of X-Ray Security Scanners in Michigan.
Parry, Donald E
2016-02-01
In January of 2013 the Transportation Security Administration (TSA) ordered the removal of x-ray security scanners from airports by June of 2013. Since that time several of these scanners have been purchased at a reduced cost by various state and county governments for use in screening individuals entering or leaving their facilities. To address this issue the Radiation Safety Section of the State of Michigan drafted a set of registration conditions for facilities to follow when using these security scanners. Inspection procedures and measurement protocols were developed to estimate the dose to screened individuals. Inspections were performed on nine of the 16 registered backscatter scanners in the state and the one transmission scanner. The average estimated effective dose to screened individuals was ∼11 nSv for a two view scan from a backscatter system. The effective dose was 0.446 μSv, 0.330 μSv, and 0.150 μSv for a transmission system operated in the high, medium, and low dose modes, respectively. The limit suggested in the new registration condition is 0.25 μSv for a general use system and 10 μSv for a limited use system.
78 FR 48029 - Improving Chemical Facility Safety and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES ALLOWABLE... such a deposit is required by the lodging facility to secure a room reservation, prior to the beginning...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES ALLOWABLE... such a deposit is required by the lodging facility to secure a room reservation, prior to the beginning...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES ALLOWABLE... such a deposit is required by the lodging facility to secure a room reservation, prior to the beginning...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.
2009-10-14
The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
33 CFR 106.210 - OCS Facility Security Officer (FSO).
Code of Federal Regulations, 2010 CFR
2010-07-01
..., testing and maintenance of security equipment and systems. (c) Responsibilities. In addition to any other... compliance with this part; (2) Ensure the maintenance of and supervision of the implementation of the FSP... of stores and industrial supplies in compliance with this part; (4) Where applicable, propose...
19. SITE BUILDING 002 SCANNER BUILDING AIR POLICE ...
19. SITE BUILDING 002 - SCANNER BUILDING - AIR POLICE SITE SECURITY OFFICE WITH "SITE PERIMETER STATUS PANEL" AND REAL TIME VIDEO DISPLAY OUTPUT FROM VIDEO CAMERA SYSTEM AT SECURITY FENCE LOCATIONS. - Cape Cod Air Station, Technical Facility-Scanner Building & Power Plant, Massachusetts Military Reservation, Sandwich, Barnstable County, MA
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. Technicians monitor the progress as the second panel is being moved to join the first panel on the storage stand. To the right is the Launch Abort system secured on a work stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
49 CFR 193.2905 - Protective enclosures.
Code of Federal Regulations, 2011 CFR
2011-10-01
... stations; (7) Control systems; (8) Fire control equipment; (9) Security communications systems; and (10... not be located near features outside of the facility, such as trees, poles, or buildings, which could...
49 CFR 195.436 - Security of facilities.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 3 2011-10-01 2011-10-01 false Security of facilities. 195.436 Section 195.436... PIPELINE Operation and Maintenance § 195.436 Security of facilities. Each operator shall provide protection for each pumping station and breakout tank area and other exposed facility (such as scraper traps...
Kempker, Samantha M; Schmidt, Adam T; Espinosa, Erin M
2017-07-01
Justice-involved youth have high rates of psychiatric diagnoses, and these youth are often placed out-of-home, although evidence identifies several negative implications of juvenile confinement, especially for youth with psychopathology. Furthermore, youth in the justice system may be processed differently based on gender. As males and females tend to manifest symptoms differently, the psychopathology of youth may act to moderate the relationship between gender and placement in the juvenile justice system. The present study used a large, diverse sample (n = 9 851, 19.8 % female) to examine whether youth placed in various types of out-of-home facilities differed in terms of externalizing, internalizing, substance use, or comorbid disorders, and to determine the predictive value of mental health diagnoses in placement decisions. The moderation effect of psychopathology and substance use on the relationship between gender and placement also was explored. The results indicated that each type of disorder differed across placements, with internalizing being most prevalent in non-secure, and externalizing, comorbid, and substance use being most prevalent in secure settings. Mental health diagnoses improved the prediction of placement in each out-of-home placement beyond legal and demographic factors such that externalizing and substance use disorders decreased the likelihood of placement in non-secure settings, and internalizing, externalizing, and substance use disorders increased the likelihood of placement in secure and state-secure facilities. The relationship between internalizing pathology and placement in more secure facilities was moderated by externalizing pathology. The relationship between gender and placement was significantly moderated by mental health such that females with mental health diagnoses receive less secure placements. Implications for policymakers and practitioners are discussed, as well as implications for reforming juvenile justice within a developmental approach.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-13
... an emergency condition \\9\\ with respect to trading on or through the systems and facilities of the... prevent the NYSE from operating normally; and (ii) such a declaration is necessary so that the securities markets in general, and the NYSE's systems and facilities, including the trading floor, in particular, may...
Code of Federal Regulations, 2012 CFR
2012-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2011 CFR
2011-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2010 CFR
2010-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2013 CFR
2013-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
Code of Federal Regulations, 2014 CFR
2014-07-01
... an energy or mining facility, a storage facility or a seafood processing facility, or when secured to a storage facility or a seafood processing facility, or when secured to the bed of the ocean...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
33 CFR 105.415 - Amendment and audit.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Amendment and audit. 105.415 Section 105.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Plan (FSP) § 105.415 Amendment and audit. (a) Amendments. (1) Amendments to a Facility Securit...
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Emerging Technology for School Security
ERIC Educational Resources Information Center
Doss, Kevin T.
2012-01-01
Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…
77 FR 8825 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-15
... LEAD BY EXAMPLE using the application just as we expect those ``in the field'' to do. The information... access and visibility of this information. DMHRSi uses role-based security so a user sees only the... hosted in a secure facility managed by the Defense Information Systems Agency. For JMIS military and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-28
... who carry concealed firearms. Categories of records in the system: Individual's name; Social Security..., private and public schools, daycare facilities, children's camps, and childcare transportation providers... activity regarding child pornography, the touching of a child for sexual gratification, or child abuse. N...
DOT National Transportation Integrated Search
2010-04-21
Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...
Security basics for long-term care facilities.
Green, Martin
2015-01-01
The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.
A Principal's Guide to ILS Facilities Installation.
ERIC Educational Resources Information Center
Ross, Tweed W.
1992-01-01
Outlines five facilities considerations that school principals need to address prior to the installation of an integrated learning system (ILS): (1) placement, i.e., labs or classrooms; (2) wiring; (3) environment, including furniture and noise; (4) security, including fire, theft, vandalism, and misuse; and (5) usability, including afterschool…
33 CFR 106.140 - Maritime Security (MARSEC) Directive.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2013 CFR
2013-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2012 CFR
2012-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2011 CFR
2011-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2014 CFR
2014-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
33 CFR 106.260 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Green, M.W.
As problems of violence and crime become more prevalent in our schools (or at least the perception of their prevalence), more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense U.S. social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti-graffiti methods, and duress alarms can all be effective, given they aremore » used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems (`big picture`) approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more to the general `order maintenance` of the facility than could be achieved by separate measures not integrated or related.« less
Biosecurity measures in 48 isolation facilities managing highly infectious diseases.
Puro, Vincenzo; Fusco, Francesco M; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe
2012-06-01
Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an "insider attack."
Biosecurity Measures in 48 Isolation Facilities Managing Highly Infectious Diseases
Puro, Vincenzo; Schilling, Stefan; Thomson, Gail; De Iaco, Giuseppina; Brouqui, Philippe; Maltezou, Helena C.; Bannister, Barbara; Gottschalk, René; Brodt, Hans-Rheinhard; Ippolito, Giuseppe
2012-01-01
Biosecurity measures are traditionally applied to laboratories, but they may also be usefully applied in highly specialized clinical settings, such as the isolation facilities for the management of patients with highly infectious diseases (eg, viral hemorrhagic fevers, SARS, smallpox, potentially severe pandemic flu, and MDR- and XDR-tuberculosis). In 2009 the European Network for Highly Infectious Diseases conducted a survey in 48 isolation facilities in 16 European countries to determine biosecurity measures for access control to the facility. Security personnel are present in 39 facilities (81%). In 35 facilities (73%), entrance to the isolation area is restricted; control methods include electronic keys, a PIN system, closed-circuit TV, and guards at the doors. In 25 facilities (52%), identification and registration of all staff entering and exiting the isolation area are required. Access control is used in most surveyed centers, but specific lacks exist in some facilities. Further data are needed to assess other biosecurity aspects, such as the security measures during the transportation of potentially contaminated materials and measures to address the risk of an “insider attack.” PMID:22571373
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
Leveraging Safety Programs to Improve and Support Security Programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Snell, Mark K.; Pratt, R.
2015-10-01
There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.
ERIC Educational Resources Information Center
Traver, Michael D.; Rule, Warren R.
1996-01-01
Reviews the types of treatment facilities being utilized by youth facilities nationwide and their practices regarding self-mutilating residents. Results indicate varied frequencies of self-harming behavior. Findings suggest that departments that chose to take responsibility for stabilizing mutilating adolescents as a distinct group express greater…
Nuclear Power Plant Security and Vulnerabilities
2009-03-18
Commercial Spent Nuclear Fuel Storage , Public Report...systems that prevent hot nuclear fuel from melting even after the chain reaction has stopped, and storage facilities for highly radioactive spent nuclear ... nuclear fuel cycle facilities must defend against to prevent radiological sabotage and theft of strategic special nuclear material. NRC licensees use
Integration of the SSPM and STAGE with the MPACT Virtual Facility Distributed Test Bed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cipiti, Benjamin B.; Shoman, Nathan
The Material Protection Accounting and Control Technologies (MPACT) program within DOE NE is working toward a 2020 milestone to demonstrate a Virtual Facility Distributed Test Bed. The goal of the Virtual Test Bed is to link all MPACT modeling tools, technology development, and experimental work to create a Safeguards and Security by Design capability for fuel cycle facilities. The Separation and Safeguards Performance Model (SSPM) forms the core safeguards analysis tool, and the Scenario Toolkit and Generation Environment (STAGE) code forms the core physical security tool. These models are used to design and analyze safeguards and security systems and generatemore » performance metrics. Work over the past year has focused on how these models will integrate with the other capabilities in the MPACT program and specific model changes to enable more streamlined integration in the future. This report describes the model changes and plans for how the models will be used more collaboratively. The Virtual Facility is not designed to integrate all capabilities into one master code, but rather to maintain stand-alone capabilities that communicate results between codes more effectively.« less
Tornado Recovery Ongoing at NASA’s Michoud Assembly Facility, New Orleans LA
2017-02-07
Teams at NASA’s Michoud Assembly Facility in New Orleans are continuing with recovery efforts following a tornado strike at the facility Tuesday, Feb. 7. Michoud remains closed to all but security and emergency operations crews. For more than half a century, Michoud has been the space agency’s premiere site for manufacturing and assembly of large-scale space structures and systems.
Full Scale Drinking Water System Decontamination at the Water Security Test Bed.
Szabo, Jeffrey; Hall, John; Reese, Steve; Goodrich, Jim; Panguluri, Sri; Meiners, Greg; Ernst, Hiba
2018-03-20
The EPA's Water Security Test Bed (WSTB) facility is a full-scale representation of a drinking water distribution system. In collaboration with the Idaho National Laboratory (INL), EPA designed the WSTB facility to support full-scale evaluations of water infrastructure decontamination, real-time sensors, mobile water treatment systems, and decontamination of premise plumbing and appliances. The EPA research focused on decontamination of 1) Bacillus globigii (BG) spores, a non-pathogenic surrogate for Bacillus anthracis and 2) Bakken crude oil. Flushing and chlorination effectively removed most BG spores from the bulk water but BG spores still remained on the pipe wall coupons. Soluble oil components of Bakken crude oil were removed by flushing although oil components persisted in the dishwasher and refrigerator water dispenser. Using this full-scale distribution system allows EPA to 1) test contaminants without any human health or ecological risk and 2) inform water systems on effective methodologies responding to possible contamination incidents.
10 CFR 1016.9 - Processing security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Processing security facility approval. 1016.9 Section 1016... § 1016.9 Processing security facility approval. The following receipt of an acceptable request for... granted pursuant to § 1016.6 of this part. ...
10 CFR 1016.9 - Processing security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Processing security facility approval. 1016.9 Section 1016... § 1016.9 Processing security facility approval. The following receipt of an acceptable request for... granted pursuant to § 1016.6 of this part. ...
Interactive telemedicine solution based on a secure mHealth application.
Eldeib, Ayman M
2014-01-01
In dynamic healthcare environments, caregivers and patients are constantly moving. To increase the healthcare quality when it is necessary, caregivers need the ability to reach each other and securely access medical information and services from wherever they happened to be. This paper presents an Interactive Telemedicine Solution (ITS) to facilitate and automate the communication within a healthcare facility via Voice over Internet Protocol (VOIP), regular mobile phones, and Wi-Fi connectivity. Our system has the capability to exchange/provide securely healthcare information/services across geographic barriers through 3G/4G wireless communication network. Our system assumes the availability of an Electronic Health Record (EHR) system locally in the healthcare organization and/or on the cloud network such as a nation-wide EHR system. This paper demonstrate the potential of our system to provide effectively and securely remote healthcare solution.
75 FR 79077 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-17
... rehabilitation, phase I Airfield sweeper Airfield pavement markings Airport operations area security improvements... Collection and Use at a $3.00 PFC Level: Permanent in-line baggage system design Terminal 3 security... the FAA to design and construct the South Air Traffic Control Tower. In addition, due to the complex...
Management of Library Security. SPEC Kit 247 and SPEC Flyer 247.
ERIC Educational Resources Information Center
Soete, George J., Comp.; Zimmerman, Glen, Comp.
This SPEC (Systems and Procedures Exchange Center) Kit and Flyer reports results of a survey conducted in January 1999 that examined how ARL (Association of Research Libraries) member libraries assure the safety and security of persons, library materials, physical facilities, furnishings, computer equipment, etc. Forty-five of the 122 ARL member…
Code of Federal Regulations, 2011 CFR
2011-10-01
... Department of Defense facility security clearance because each co-venturer may post particular problems in... Acquisition Regulations System DEPARTMENT OF STATE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT... progress have not yet been performed for purposes of this definition. Type of construction means the...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Department of Defense facility security clearance because each co-venturer may post particular problems in... Acquisition Regulations System DEPARTMENT OF STATE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT... progress have not yet been performed for purposes of this definition. Type of construction means the...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Department of Defense facility security clearance because each co-venturer may post particular problems in... Acquisition Regulations System DEPARTMENT OF STATE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT... progress have not yet been performed for purposes of this definition. Type of construction means the...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Department of Defense facility security clearance because each co-venturer may post particular problems in... Acquisition Regulations System DEPARTMENT OF STATE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT... progress have not yet been performed for purposes of this definition. Type of construction means the...
"Security Theater" in the Pediatric Wing: The Case for RFID Protection for Infants in Hospitals
NASA Astrophysics Data System (ADS)
Wyld, David C.
In a typical year, five infants are abducted by strangers from hospitals. These are devastating events for the families involved and for the health care facilities' staff and executives. This article looks at the nature of newborn and infant abductions, analyzing data on these kidnappings from the FBI and from the National Center for Missing & Exploited Children. Then, the article examines the potential for RFID (radio frequency identification) based systems to improve security in the pediatric area of hospitals, providing an overview of the technology on the market today for infant protection. The article concludes with an analysis of the ROI (return on investment) equation for health care administrators to consider in weighing their options on how to prevent a statistically unlikely, but potentially cataclysmic occurrence, at their facility. In the end, RFID-based infant protection systems can be seen as a form of "security theater," serving as a "palliative countermeasure" that will indeed work - both substantively and psychologically - to promote a more secure hospital environment for moms and their newborns.
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2010 CFR
2010-10-01
... with security-related duties. (a) Security threat assessments. Each certified cargo screening facility... certified cargo screening facility complete a security threat assessment or comparable security threat... acuity, physical coordination, and motor skills to the extent required to effectively operate cargo...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.245 - Review and approval of site security plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...
6 CFR 27.210 - Submissions schedule.
Code of Federal Regulations, 2010 CFR
2010-01-01
... in any subsequent Federal Register notice. (2) Security Vulnerability Assessment. Unless otherwise notified, a covered facility must complete and submit a Security Vulnerability Assessment within 90... Department's approval of the facility's Site Security Plan. (2) Security Vulnerability Assessment. Unless...
33 CFR 105.220 - Drill and exercise requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...
33 CFR 105.220 - Drill and exercise requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...
33 CFR 105.220 - Drill and exercise requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...
33 CFR 105.220 - Drill and exercise requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...
33 CFR 105.220 - Drill and exercise requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Drill and exercise requirements... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.220 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned...
Perimeter security for Minnesota correctional facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crist, D.; Spencer, D.D.
1996-12-31
For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned newmore » construction at other facilities.« less
Nuclear Security Education Program at the Pennsylvania State University
DOE Office of Scientific and Technical Information (OSTI.GOV)
Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor
The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less
Marshall Space Flight Center Test Capabilities
NASA Technical Reports Server (NTRS)
Hamilton, Jeffrey T.
2005-01-01
The Test Laboratory at NASA's Marshall Space Flight Center has over 50 facilities across 400+ acres inside a secure, fenced facility. The entire Center is located inside the boundaries of Redstone Arsenal, a 40,000 acre military reservation. About 150 Government and 250 contractor personnel operate facilities capable of all types of propulsion and structural testing, from small components to engine systems and structural strength, structural dynamic and environmental testing. We have tremendous engineering expertise in research, evaluation, analysis, design and development, and test of space transportation systems, subsystems, and components.
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2014-01-01 2014-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2011-01-01 2011-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2013-01-01 2013-01-01 false Review and approval of security vulnerability...
6 CFR 27.240 - Review and approval of security vulnerability assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.240 Review and approval of security vulnerability assessments. (a) Review and Approval. The Department will review and... 6 Domestic Security 1 2012-01-01 2012-01-01 false Review and approval of security vulnerability...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
36 CFR 1254.10 - For how long and where is my researcher identification card valid?
Code of Federal Regulations, 2010 CFR
2010-07-01
... facilities in the Washington, DC, area and other NARA facilities that issue and use plastic researcher identification cards as part of their security systems, we issue a plastic card to replace the paper card issued... ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED HISTORICAL...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
33 CFR 127.1109 - Lighting systems.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Lighting systems. 127.1109 Section 127.1109 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Hazardous Gas Design and Construction § 127.1109 Lighting systems...
Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, Shannon
In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less
ERIC Educational Resources Information Center
Kennedy, Mike
2003-01-01
Offers ten suggestions for schools and universities to maximize their budgets: energy upgrades, security technology, maintenance management systems, partnerships, modernized washrooms, windows, facilities assessment, outsourcing, alternative fuels, and building commissioning. (EV)
Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O.
2013-02-01
Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors,more » active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.« less
Advanced Millimeter-Wave Imaging Enhances Security Screening
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Bernacki, Bruce E.; McMakin, Douglas L.
2012-01-12
Millimeter-wave imaging is rapidly gaining acceptance for passenger screening at airports and other secured facilities. This paper details a number of techniques developed over the last several years including novel image reconstruction and display techniques, polarimetric imaging techniques, array switching schemes, as well as high frequency high bandwidth techniques. Implementation of some of these methods will increase the cost and complexity of the mm-wave security portal imaging systems. RF photonic methods may provide new solutions to the design and development of the sequentially switched linear mm-wave arrays that are the key element in the mm-wave portal imaging systems.
Advanced Millimeter-Wave Security Portal Imaging Techniques
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Bernacki, Bruce E.; McMakin, Douglas L.
2012-04-01
Millimeter-wave imaging is rapidly gaining acceptance for passenger screening at airports and other secured facilities. This paper details a number of techniques developed over the last several years including novel image reconstruction and display techniques, polarimetric imaging techniques, array switching schemes, as well as high frequency high bandwidth techniques. Implementation of some of these methods will increase the cost and complexity of the mm-wave security portal imaging systems. RF photonic methods may provide new solutions to the design and development of the sequentially switched linear mm-wave arrays that are the key element in the mm-wave portal imaging systems.
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
A secure file manager for UNIX
DOE Office of Scientific and Technical Information (OSTI.GOV)
DeVries, R.G.
1990-12-31
The development of a secure file management system for a UNIX-based computer facility with supercomputers and workstations is described. Specifically, UNIX in its usual form does not address: (1) Operation which would satisfy rigorous security requirements. (2) Online space management in an environment where total data demands would be many times the actual online capacity. (3) Making the file management system part of a computer network in which users of any computer in the local network could retrieve data generated on any other computer in the network. The characteristics of UNIX can be exploited to develop a portable, secure filemore » manager which would operate on computer systems ranging from workstations to supercomputers. Implementation considerations making unusual use of UNIX features, rather than requiring extensive internal system changes, are described, and implementation using the Cray Research Inc. UNICOS operating system is outlined.« less
Assessment on security system of radioactive sources used in hospitals of Thailand
NASA Astrophysics Data System (ADS)
Jitbanjong, Petchara; Wongsawaeng, Doonyapong
2016-01-01
Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.
33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
... Vulnerability and Security Measures Summary (Form CG-6025) in appendix A to part 105-Facility Vulnerability and... resubmission of the FSP. (c) The Facility Vulnerability and Security Measures Summary (Form CG-6025) must be completed using information in the FSA concerning identified vulnerabilities and information in the FSP...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
...-safeguards information (SUNSI). The amendments would approve the proposed Cyber Security Plan and... Commission-approved Cyber Security Plan as required by 10 CFR 73.54. Basis for proposed no significant... Facility Operating License (FOL) to implement and maintain a Cyber Security Plan as part of the facility's...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical... Risk-Based Tiering. Following review of a covered facility's Security Vulnerability Assessment, the...
A review of video security training and assessment-systems and their applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cellucci, J.; Hall, R.J.
1991-01-01
This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, usermore » training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.« less
Energy Systems Integration News | Energy Systems Integration Facility |
laboratories to attend the workshop on best practices for distributed energy resource (DER) security. Exploring grid. The U.S. Department of Energy (DOE) H2@Scale initiative is exploring the potential for wide-scale
Sandia National Laboratories: Sandia National Laboratories: Missions:
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
77 FR 27740 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-11
... storage media''. Retrievability: Delete ``and Social Security Number''. Safeguards: Delete last sentence...: * * * * * Categories of individuals covered by the system: Delete entry and replace with ``Children and their sponsors... admission to, DLA-managed day care facilities.'' Categories of records in the system: Delete ``Social...
Secure Internet video conferencing for assessing acute medical problems in a nursing facility.
Weiner, M.; Schadow, G.; Lindbergh, D.; Warvel, J.; Abernathy, G.; Dexter, P.; McDonald, C. J.
2001-01-01
Although video-based teleconferencing is becoming more widespread in the medical profession, especially for scheduled consultations, applications for rapid assessment of acute medical problems are rare. Use of such a video system in a nursing facility may be especially beneficial, because physicians are often not immediately available to evaluate patients. We have assembled and tested a portable, wireless conferencing system to prepare for a randomized trial of the system s influence on resource utilization and satisfaction. The system includes a rolling cart with video conferencing hardware and software, a remotely controllable digital camera, light, wireless network, and battery. A semi-automated paging system informs physicians of patient s study status and indications for conferencing. Data transmission occurs wirelessly in the nursing home and then through Internet cables to the physician s home. This provides sufficient bandwidth to support quality motion images. IPsec secures communications. Despite human and technical challenges, this system is affordable and functional. Images Figure 1 PMID:11825286
33 CFR 146.105 - General alarm system.
Code of Federal Regulations, 2010 CFR
2010-07-01
... manned facility must have a general alarm system. When operated, this system shall be audible in all... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false General alarm system. 146.105 Section 146.105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED...
Hydrogen Infrastructure Testing and Research Facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2017-04-10
Learn about the Hydrogen Infrastructure Testing and Research Facility (HITRF), where NREL researchers are working on vehicle and hydrogen infrastructure projects that aim to enable more rapid inclusion of fuel cell and hydrogen technologies in the market to meet consumer and national goals for emissions reduction, performance, and energy security. As part of NREL’s Energy Systems Integration Facility (ESIF), the HITRF is designed for collaboration with a wide range of hydrogen, fuel cell, and transportation stakeholders.
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
33 CFR 105.410 - Submission and approval.
Code of Federal Regulations, 2010 CFR
2010-07-01
... operational characteristics of each facility and must complete a separate Facility Vulnerability and Security Measures Summary (Form CG-6025), in appendix A to part 105—Facility Vulnerability and Security Measures...
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
... established pursuant to the policies duly authorized under the National Industrial Security Program. The proxy... Influence (FOCI) in order to maintain the Facility Security Clearance held by MOX Services. No physical... Facility Security Clearance, is in accordance with the provisions of the AEA of 1954, as amended. The...
TA 55 Reinvestment Project II Phase C Update Project Status May 23, 2017
DOE Office of Scientific and Technical Information (OSTI.GOV)
Giordano, Anthony P.
The TA-55 Reinvestment Project (TRP) II Phase C is a critical infrastructure project focused on improving safety and reliability of the Los Alamos National Laboratory (LANL) TA-55 Complex. The Project recapitalizes and revitalizes aging and obsolete facility and safety systems providing a sustainable nuclear facility for National Security Missions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Tiering. 27.220 Section 27.220 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.220 Tiering. (a) Preliminary Determination of Risk-Based Tiering. Based on...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...
Active shooter in educational facility.
Downs, Scott
2015-01-01
The last decade has seen several of the most heinous acts imaginable committed against our educational facilities. In light of the recent shooting in Sandy Hook Elementary School in Monroe (Newtown), CT, which took the lives of 20 children and six employees, a new heightened sense of awareness for safety and security among our educational facilities was created.(1) The law enforcement and public-safety community is now looking to work together with many of the educational representatives across the nation to address this issue, which affects the educational environment now and in the future. The US public and private elementary and secondary school systems' population is approximately 55.2 million students with an additional 19.1 million students attending a 2- and 4-year college or university. These same public and private school and degree-granting institutions employ approximately 7.6 million staff members who can be an enormous threshold of potential targets.(2) A terrorist's act, whether domestic, international, or the actions of a Lone Wolf against one of our educational facilities, would create a major rippling effect throughout our nation. Terrorists will stop at nothing to advance their ideology and they must continue to advance their most powerful tool-fear-to further their agenda and mission of destroying our liberty and the advanced civilization of the Western hemisphere. To provide the safety and security for our children and those who are employed to educate them, educational institutions must address this issue as well as nullify the possible threat to our national security. This thesis used official government reports and data interview methodologies to address various concerns from within our nation's educational system. Educational personnel along with safety and security experts identified, describe, and pinpointed the recommended measures that our educational institutions should include to secure our nation from within. These modifications of evaluating and updating their current emergency operations plan, if implemented correctly, will bring heightened awareness, as well as define roles and responsibilities, to everyone involved. In addition, these implementations will assist in coordinating and strengthening a multiagency partnership's among the public-safety community that will mitigate the risk to our student body, faculty, and staff, and strengthen our national security.
Wang, Huan-Huan; Liu, Shu-Ming; Jiang, Shuaiz; Meng, Fan-Lin; Bai, Lu
2013-01-01
In the last few decades, anti-negative pressure facility (ANPF) has been emerged as a revolutionary approach for sloving the pollution in the Second Water Supply System (SWSS) in China. This study analyzed implications of the safety in SWSS with ANPF, utilizing the water distribution network hydraulic model. A method of hydraulic simulation and security assessment was presented which was able to reflect the number and location of nodes that can be installed in ANPF. Benchmark results through two instance networks showed that 67% and 89% of nodes in each network did not fit the ANPFs for installation. The simple and pratical algorithm was recommended in the water distribution network design and planing in order to increase the security of SWSS.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false General. 611.602 Section 611.602 Federal Acquisition Regulations System DEPARTMENT OF STATE COMPETITION AND ACQUISITION... construction of new secure Embassies, Consulates, and related facilities, as well as renovations of newly...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false General. 611.602 Section 611.602 Federal Acquisition Regulations System DEPARTMENT OF STATE COMPETITION AND ACQUISITION... construction of new secure Embassies, Consulates, and related facilities, as well as renovations of newly...
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false General. 611.602 Section 611.602 Federal Acquisition Regulations System DEPARTMENT OF STATE COMPETITION AND ACQUISITION... construction of new secure Embassies, Consulates, and related facilities, as well as renovations of newly...
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
46 CFR 111.30-24 - Generation systems greater than 3000 kw.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Section 111.30-24 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Switchboards § 111.30-24 Generation systems greater than 3000 kw... Outer Continental Shelf facility, when the total installed electric power of the ship's service...
46 CFR 111.30-24 - Generation systems greater than 3000 kw.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Section 111.30-24 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Switchboards § 111.30-24 Generation systems greater than 3000 kw... Outer Continental Shelf facility, when the total installed electric power of the ship's service...
46 CFR 111.30-24 - Generation systems greater than 3000 kw.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Section 111.30-24 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Switchboards § 111.30-24 Generation systems greater than 3000 kw... Outer Continental Shelf facility, when the total installed electric power of the ship's service...
46 CFR 111.30-24 - Generation systems greater than 3000 kw.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Section 111.30-24 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Switchboards § 111.30-24 Generation systems greater than 3000 kw... Outer Continental Shelf facility, when the total installed electric power of the ship's service...
46 CFR 111.30-24 - Generation systems greater than 3000 kw.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Section 111.30-24 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING ELECTRIC SYSTEMS-GENERAL REQUIREMENTS Switchboards § 111.30-24 Generation systems greater than 3000 kw... Outer Continental Shelf facility, when the total installed electric power of the ship's service...
7 CFR 1735.22 - Loan security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... that do not constitute self-contained operating systems or units (such as lines switched by other systems), the borrower shall, in addition to the mortgage lien on all of the borrower's telephone... entire system, including the facilities to be constructed with the proceeds of the loan, is economically...
7 CFR 1735.22 - Loan security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... that do not constitute self-contained operating systems or units (such as lines switched by other systems), the borrower shall, in addition to the mortgage lien on all of the borrower's telephone... entire system, including the facilities to be constructed with the proceeds of the loan, is economically...
7 CFR 1735.22 - Loan security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... that do not constitute self-contained operating systems or units (such as lines switched by other systems), the borrower shall, in addition to the mortgage lien on all of the borrower's telephone... entire system, including the facilities to be constructed with the proceeds of the loan, is economically...
Systems and methods for harvesting and storing materials produced in a nuclear reactor
Heinold, Mark R.; Dayal, Yogeshwar; Brittingham, Martin W.
2016-04-05
Systems produce desired isotopes through irradiation in nuclear reactor instrumentation tubes and deposit the same in a robust facility for immediate shipping, handling, and/or consumption. Irradiation targets are inserted and removed through inaccessible areas without plant shutdown and placed in the harvesting facility, such as a plurality of sealable and shipping-safe casks and/or canisters. Systems may connect various structures in a sealed manner to avoid release of dangerous or unwanted matter throughout the nuclear plant, and/or systems may also automatically decontaminate materials to be released. Useable casks or canisters can include plural barriers for containment that are temporarily and selectively removable with specially-configured paths inserted therein. Penetrations in the facilities may limit waste or pneumatic gas escape and allow the same to be removed from the systems without over-pressurization or leakage. Methods include processing irradiation targets through such systems and securely delivering them in such harvesting facilities.
2017-07-01
Cleared for Public Release China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of China’s...paper provides a preliminary look at the origins of China’s military support facility in Djibouti. It explores the evolution of the economic and security...military facilities abroad. It also assesses the implications of the growing economic and military ties between the two countries for the United
An Encryption Scheme for Communication Internet SCADA Components
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Inspections and audits. 27.250 Section 27.250 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to...
33 CFR 105.290 - Additional requirements-cruise ship terminals.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Additional requirements-cruise ship terminals. 105.290 Section 105.290 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.290 Additional requirements—cruise ship terminals...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
6 CFR 27.250 - Inspections and audits.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.250 Inspections and audits. (a) Authority. In order to... directed by § 27.245(b) in “Review and Approval of Site Security Plans.” (c) Time and Manner. Authorized...
6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”
Code of Federal Regulations, 2011 CFR
2011-01-01
... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND... Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a... a high level of security risk based on any information available (including any information...
33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025) ER22OC03.000...
Moses, E. I.; Lindl, J. D.; Spaeth, M. L.; ...
2017-03-23
The National Ignition Facility (NIF) at Lawrence Livermore National Laboratory has been operational since March 2009 and has been transitioning to a user facility supporting ignition science, high energy density stockpile science, national security applications, and fundamental science. The facility has achieved its design goal of 1.8 MJ and 500 TW of 3ω light on target, and has performed target experiments with 1.9 MJ at peak powers of 410 TW. The National Ignition Campaign (NIC), established by the U.S. National Nuclear Security Administration in 2005, was responsible for transitioning NIF from a construction project to a national user facility. Besidesmore » the operation and optimization of the use of the NIF laser, the NIC program was responsible for developing capabilities including target fabrication facilities; cryogenic layering capabilities; over 60 optical, X-ray, and nuclear diagnostic systems; experimental platforms; and a wide range of other NIF facility infrastructure. This study provides a summary of some of the key experimental results for NIF to date, an overview of the NIF facility capabilities, and the challenges that were met in achieving these capabilities. Finally, they are covered in more detail in the papers that follow.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moses, E. I.; Lindl, J. D.; Spaeth, M. L.
The National Ignition Facility (NIF) at Lawrence Livermore National Laboratory has been operational since March 2009 and has been transitioning to a user facility supporting ignition science, high energy density stockpile science, national security applications, and fundamental science. The facility has achieved its design goal of 1.8 MJ and 500 TW of 3ω light on target, and has performed target experiments with 1.9 MJ at peak powers of 410 TW. The National Ignition Campaign (NIC), established by the U.S. National Nuclear Security Administration in 2005, was responsible for transitioning NIF from a construction project to a national user facility. Besidesmore » the operation and optimization of the use of the NIF laser, the NIC program was responsible for developing capabilities including target fabrication facilities; cryogenic layering capabilities; over 60 optical, X-ray, and nuclear diagnostic systems; experimental platforms; and a wide range of other NIF facility infrastructure. This study provides a summary of some of the key experimental results for NIF to date, an overview of the NIF facility capabilities, and the challenges that were met in achieving these capabilities. Finally, they are covered in more detail in the papers that follow.« less
The Design Process of Physical Security as Applied to a U.S. Border Port of Entry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, G.G.
1999-02-22
This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functionsmore » of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.« less
Assessment on security system of radioactive sources used in hospitals of Thailand
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong
Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources usedmore » in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.« less
ERIC Educational Resources Information Center
Kennedy, Mike
2000-01-01
Examines how the use of electronic access-control system enables college and universities to provide a safer environment for students and staff. The advantages of no-key doors, adapting entry card systems for multiple uses, and successfully retaining lock and key systems when facilities do not lend themselves to electronic security are discussed.…
32 CFR Appendix B to Part 223 - Guidelines for the Determination of DoD UCNI
Code of Federal Regulations, 2011 CFR
2011-07-01
... Systems a. Information on the layout or design of security and alarm systems at a specific DoD SNM.... Frequency and schedule of DoD SNM inventories. 3. Facility Description a. Maps, conceptual design, and...
32 CFR Appendix B to Part 223 - Guidelines for the Determination of DoD UCNI
Code of Federal Regulations, 2012 CFR
2012-07-01
... Systems a. Information on the layout or design of security and alarm systems at a specific DoD SNM.... Frequency and schedule of DoD SNM inventories. 3. Facility Description a. Maps, conceptual design, and...
32 CFR Appendix B to Part 223 - Guidelines for the Determination of DoD UCNI
Code of Federal Regulations, 2010 CFR
2010-07-01
... Systems a. Information on the layout or design of security and alarm systems at a specific DoD SNM.... Frequency and schedule of DoD SNM inventories. 3. Facility Description a. Maps, conceptual design, and...
48 CFR 837.7004 - Administrative necessity.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Administrative necessity. 837.7004 Section 837.7004 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... further action, the contracting officer will secure from the facility or VISN director, as appropriate, a...
48 CFR 837.7004 - Administrative necessity.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Administrative necessity. 837.7004 Section 837.7004 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... further action, the contracting officer will secure from the facility or VISN director, as appropriate, a...
48 CFR 837.7004 - Administrative necessity.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Administrative necessity. 837.7004 Section 837.7004 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... further action, the contracting officer will secure from the facility or VISN director, as appropriate, a...
48 CFR 837.7004 - Administrative necessity.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Administrative necessity. 837.7004 Section 837.7004 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... further action, the contracting officer will secure from the facility or VISN director, as appropriate, a...
48 CFR 837.7004 - Administrative necessity.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Administrative necessity. 837.7004 Section 837.7004 Federal Acquisition Regulations System DEPARTMENT OF VETERANS AFFAIRS... further action, the contracting officer will secure from the facility or VISN director, as appropriate, a...
30 CFR 75.1912 - Fire suppression systems for permanent underground diesel fuel storage facilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... electrical system failure. (g) Electrically operated detection and actuation circuits shall be monitored and... operated, a means shall be provided to indicate the functional readiness status of the detection system. (h... susceptible to alteration or recorded electronically in a secured computer system that is not susceptible to...
30 CFR 75.1912 - Fire suppression systems for permanent underground diesel fuel storage facilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... electrical system failure. (g) Electrically operated detection and actuation circuits shall be monitored and... operated, a means shall be provided to indicate the functional readiness status of the detection system. (h... susceptible to alteration or recorded electronically in a secured computer system that is not susceptible to...
30 CFR 75.1912 - Fire suppression systems for permanent underground diesel fuel storage facilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... electrical system failure. (g) Electrically operated detection and actuation circuits shall be monitored and... operated, a means shall be provided to indicate the functional readiness status of the detection system. (h... susceptible to alteration or recorded electronically in a secured computer system that is not susceptible to...
30 CFR 75.1912 - Fire suppression systems for permanent underground diesel fuel storage facilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... electrical system failure. (g) Electrically operated detection and actuation circuits shall be monitored and... operated, a means shall be provided to indicate the functional readiness status of the detection system. (h... susceptible to alteration or recorded electronically in a secured computer system that is not susceptible to...
30 CFR 75.1912 - Fire suppression systems for permanent underground diesel fuel storage facilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... electrical system failure. (g) Electrically operated detection and actuation circuits shall be monitored and... operated, a means shall be provided to indicate the functional readiness status of the detection system. (h... susceptible to alteration or recorded electronically in a secured computer system that is not susceptible to...
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
33 CFR 106.415 - Amendment and audit.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Amendment and audit. 106.415 Section 106.415 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Plan (FSP) § 106.415 Amendment and...
Utilizing Regional Centers in Sustaining Upgraded Russian Federation Ministry of Defense Sites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kaldenbach, Karen Yvonne; Chainikov, General Vladimir; Fedorov, General Victor
2010-01-01
Since the mid-1990s the governments of the United States (U.S.) and the Russian Federation (RF) have been collaborating on nonproliferation projects, particularly in the protection of nuclear material through the Department of Energy's (DOE) National Nuclear Security Administration (NNSA). To date, this collaboration has resulted in upgrades to more than 72 RF Ministry of Defense (MOD) sensitive sites and facilities. These upgrades include physical protection systems (PPS), facilities to ensure material remains secure in various configurations, and infrastructure to support, maintain, and sustain upgraded sites. Significant effort on the part of both governments has also been expended to ensure thatmore » personnel obtain the necessary skills and training to both operate and maintain the security systems, thereby ensuring long term sustainability. To accomplish this, initial vendor training on physical protection systems was provided to key personnel, and an approved training curriculum was developed to teach the skills of operating, managing, administering, and maintaining the installed physical protection systems. This approach also included documentation of the processes and procedures to support infrastructure, requisite levels of maintenance and testing of systems and equipment, lifecycle management support, inventory systems and spare parts caches. One of the core components in the U.S. exit strategy and full transition to the RF MOD is the development and utilization of regional centers to facilitate centralized training and technical support to upgraded MOD sites in five regions of the RF. To date, two regional centers and one regional classroom facility are functional, and two additional regional centers are currently under construction. This paper will address the process and logistics of regional center establishment and the future vision for integrated regional center support by the RF MOD.« less
Nevada National Security Site Environmental Report 2016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wills
This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSERmore » summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple missions. The three major NNSS missions include National Security/Defense, Environmental Management, and Nondefense. The major programs that support these missions are Stockpile Stewardship and Management, Nonproliferation and Counterterrorism, Nuclear Emergency Response, Strategic Partnership Projects, Environmental Restoration, Waste Management, Conservation and Renewable Energy, Other Research and Development, and Infrastructure. The major facilities that support the programs include the U1a Facility, Big Explosives Experimental Facility (BEEF), Device Assembly Facility, Dense Plasma Focus Facility, Joint Actinide Shock Physics Experimental Research Facility, Radiological/Nuclear Countermeasures Test and Evaluation Complex, Nonproliferation Test and Evaluation Complex (NPTEC), Radiological/Nuclear Weapons of Mass Destruction Incident Exercise Site, the Area 5 Radioactive Waste Management Complex (RWMC), and the Area 3 Radioactive Waste Management Site (RWMS).« less
Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Durling, Jr., R L; Price, D E
2005-12-16
The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors,more » HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.« less
Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Price, D E; Durling, R L
2005-10-10
The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors,more » HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.« less
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians monitor the progress as a crane lifts the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. The second panel is being lifted by crane and technicians are monitoring the progress as it is being moved to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
2014-04-16
CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility while technicians prepare to lift the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR § 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... January 2004 (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
14 CFR 1260.35 - Investigative Requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... (a) NASA reserves the right to perform security checks and to deny or restrict access to a NASA Center, facility, or computer system, or to NASA technical information, as NASA deems appropriate. To the...
SSBRP User Operations Facility (UOF) Overview and Development Strategy
NASA Technical Reports Server (NTRS)
Picinich, Lou; Stone, Thom; Sun, Charles; Windrem, May; Givens, John J. (Technical Monitor)
1995-01-01
This paper will present the Space Station Biological Research Project (SSBRP) User Operations Facility (UOF) architecture and development strategy. A major element of the UOF at NASA Ames Research Center, the Communication and Data System (CDS) will be the primary focus of the discussions. CDS operational, telescience, security, and development objectives will be discussed along with CDS implementation strategy. The implementation strategy discussions will include: Object Oriented Analysis & Design, System & Software Prototyping, and Technology Utilization. A CDS design overview that includes: CDS Context Diagram, CDS Architecture, Object Models, Use Cases, and User Interfaces will also be presented. CDS development brings together "cutting edge" technologies and techniques such as: object oriented development, network security, multimedia networking, web-based data distribution, JAVA, and graphical user interfaces. Use of these "cutting edge" technologies and techniques translates directly to lower development and operations costs.
Code of Federal Regulations, 2010 CFR
2010-01-01
... CURRENCY, DEPARTMENT OF THE TREASURY INVESTMENT SECURITIES Interpretations § 1.130 Type II securities... financing the construction or improvement of facilities at or used by a university or a degree-granting... construction or improvement of facilities used by a hospital may be eligible as a Type II security, if the...
Modernization of B-2 Data, Video, and Control Systems Infrastructure
NASA Technical Reports Server (NTRS)
Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.
2012-01-01
The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA s third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.
Modernization of B-2 Data, Video, and Control Systems Infrastructure
NASA Technical Reports Server (NTRS)
Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.
2012-01-01
The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA's third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.
Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.
Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
2014-11-01
Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.
78 FR 17781 - Transportation Worker Identification Credential (TWIC)-Reader Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-22
...In this Notice of Proposed Rulemaking (NPRM), the Coast Guard proposes to require owners and operators of certain vessels and facilities regulated by the Coast Guard to use electronic readers designed to work with the Transportation Worker Identification Credential (TWIC) as an access control measure. This NPRM also proposes additional requirements associated with electronic TWIC readers, including recordkeeping requirements for those owners and operators required to use an electronic TWIC reader, and security plan amendments to incorporate TWIC requirements. The TWIC program, including the proposed TWIC reader requirements in this rule, is an important component of the Coast Guard's multi-layered system of access control requirements and other measures designed to enhance maritime security. This rulemaking action, once final, would build upon existing Coast Guard regulations designed to ensure that only individuals who hold a TWIC are granted unescorted access to secure areas at those locations. The Coast Guard has already promulgated regulations pursuant to the Maritime Transportation Security Act of 2002 (MTSA) that require mariners and other individuals to obtain a TWIC and present it for inspection by security personnel prior to gaining access to such secure areas. By requiring certain vessels and facilities to perform TWIC inspections using electronic TWIC readers, this rulemaking would further enhance security at those locations. This rulemaking would also implement the Security and Accountability For Every Port Act of 2006 electronic TWIC reader requirements.
Secure Video Surveillance System (SVSS) for unannounced safeguards inspections.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Galdoz, Erwin G.; Pinkalla, Mark
2010-09-01
The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed.more » ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in .jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional 'proto-type' system remains at SNL for software and hardware testing. This paper will describe the capabilities of the new surveillance system, application and requirements, and the design approach.« less
DOT National Transportation Integrated Search
2017-05-01
This research collected information on the frequency and impact of safety and security incidents (threats) at selected facilities and identified priority incidents at each facility. A customized all hazards approach was used to determine the ha...
Healthcare security staffing for smaller facilities: where science meets art.
Warren, Bryan
2013-01-01
Obtaining effective security resourcing and staffing for smaller healthcare facilities presents many difficulties, according to the author In this article, he provides guidance to security practitioners on taking existing data and translating it into a language that administration will understand and appreciate.
6 CFR 27.305 - Neutral adjudications.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Neutral adjudications. 27.305 Section 27.305 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.305 Neutral adjudications. (a) Any facility or other person who has...
6 CFR 27.305 - Neutral adjudications.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Neutral adjudications. 27.305 Section 27.305 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.305 Neutral adjudications. (a) Any facility or other person who has...
6 CFR 27.305 - Neutral adjudications.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Neutral adjudications. 27.305 Section 27.305 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.305 Neutral adjudications. (a) Any facility or other person who has...
6 CFR 27.305 - Neutral adjudications.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Neutral adjudications. 27.305 Section 27.305 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.305 Neutral adjudications. (a) Any facility or other person who has...
6 CFR 27.305 - Neutral adjudications.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Neutral adjudications. 27.305 Section 27.305 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.305 Neutral adjudications. (a) Any facility or other person who has...
[Security Management in Clinical Laboratory Departments and Facilities: Current Status and Issues].
Ishida, Haku; Nakamura, Junji; Yoshida, Hiroshi; Koike, Masaru; Inoue, Yuji
2014-11-01
We conducted a questionnaire survey regarding the current activities for protecting patients' privacy and the security of information systems (IS) related to the clinical laboratory departments of university hospitals, certified training facilities for clinical laboratories, and general hospitals in Yamaguchi Prefecture. The response rate was 47% from 215 medical institutions, including three commercial clinical laboratory centers. The results showed that there were some differences in management activities among facilities with respect to continuing education, the documentation or regulation of operational management for paper records, electronic information, remaining samples, genetic testing, and laboratory information for secondary use. They were suggested to be caused by differences in functions between university and general hospitals, differences in the scale of hospitals, or whether or not hospitals have received accreditation or ISO 15189. Regarding the IS, although the majority of facilities had sufficiently employed the access control to IS, there was some room for improvement in the management of special cases such as VIPs and patients with HIV infection. Furthermore, there were issues regarding the login method for computers shared by multiple staff, the showing of the names of personnel in charge of reports, and the risks associated with direct connections to systems and the Internet and the use of portable media such as USB memory sticks. These results indicated that further efforts are necessary for each facility to continue self-assessment and make improvements.
COLDMON -- Cold File Analysis Package
NASA Astrophysics Data System (ADS)
Rawlinson, D. J.
The COLDMON package has been written to allow system managers to identify those items of software that are not used (or used infrequently) on their systems. It consists of a few command procedures and a Fortran program to analyze the results. It makes use of the AUDIT facility and security ACLs in VMS.
76 FR 28757 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-18
... Elementary and Secondary Schools; 20 U.S.C. 921-932, Overseas Defense Dependents Education; DoD Directive.... Categories of records in the system: Records consist of first name, last name, Social Security Number (SSN... school or organization, identification numbers assigned to each school and office facility, grade level...
33 CFR 62.65 - Procedure for reporting defects and discrepancies.
Code of Federal Regulations, 2012 CFR
2012-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM Public Participation in the Aids to Navigation System § 62.65 Procedure for reporting defects and discrepancies. (a) Mariners should notify the nearest Coast Guard facility immediately of any observed aids to navigation defects or...
33 CFR 62.65 - Procedure for reporting defects and discrepancies.
Code of Federal Regulations, 2011 CFR
2011-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM Public Participation in the Aids to Navigation System § 62.65 Procedure for reporting defects and discrepancies. (a) Mariners should notify the nearest Coast Guard facility immediately of any observed aids to navigation defects or...
33 CFR 62.65 - Procedure for reporting defects and discrepancies.
Code of Federal Regulations, 2013 CFR
2013-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM Public Participation in the Aids to Navigation System § 62.65 Procedure for reporting defects and discrepancies. (a) Mariners should notify the nearest Coast Guard facility immediately of any observed aids to navigation defects or...
33 CFR 62.65 - Procedure for reporting defects and discrepancies.
Code of Federal Regulations, 2014 CFR
2014-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM Public Participation in the Aids to Navigation System § 62.65 Procedure for reporting defects and discrepancies. (a) Mariners should notify the nearest Coast Guard facility immediately of any observed aids to navigation defects or...
Research Staff | Energy Systems Integration Facility | NREL
Research Staff Research Staff NREL's Energy Systems Integration directorate includes the Power investments in advanced energy research, and the security and resilience team under the DOE's multi-lab effort to modernize the nation's electrical grid. juan.torres@nrel.gov | 303-275-3094 ESI Research
Security/Life Safety: A Need for Change.
ERIC Educational Resources Information Center
Ellsworth, Douglas
2003-01-01
In response to legislation, colleges and universities in several states must prepare to install sprinkler systems. Four basic issues an engineering study should examine include: whether the existing water service has the size, capacity, and pressure to support a sprinkler system; whether the protected facility will have to comply with more…
33 CFR 62.65 - Procedure for reporting defects and discrepancies.
Code of Federal Regulations, 2010 CFR
2010-07-01
... HOMELAND SECURITY AIDS TO NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM Public Participation in the Aids to Navigation System § 62.65 Procedure for reporting defects and discrepancies. (a) Mariners should notify the nearest Coast Guard facility immediately of any observed aids to navigation defects or...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.215-72 - Timely receipt of proposals.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Timely receipt of proposals. 2052.215-72 Section 2052.215-72 Federal Acquisition Regulations System NUCLEAR REGULATORY...-carried deliveries. The NRC is a secure facility with perimeter access-control and NRC personnel are only...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
48 CFR 2052.214-73 - Timely receipt of bids.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Timely receipt of bids. 2052.214-73 Section 2052.214-73 Federal Acquisition Regulations System NUCLEAR REGULATORY COMMISSION... is a secure facility with perimeter access-control and NRC personnel are only available to receive...
Putting the Medical Library Online: Electronic Bulletin Boards. . . and Beyond.
ERIC Educational Resources Information Center
Kittle, Paul W.
1985-01-01
Describes use of microcomputers with system called "TBBS" ("The Bread Board System") at Loma Linda University Medical Center to allow users enhanced services from home, whether library facilities are open or not. Flexibility and security, dialing into medical library, and suggestions for setting up similar computerized…
Assessing the security vulnerabilities of correctional facilities
NASA Astrophysics Data System (ADS)
Spencer, Debra D.; Morrison, G. Steve
1998-12-01
The National Institute of Justice has tasked their satellite facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps identify the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion from outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees. In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.
33 CFR 106.240 - Communications.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Communications. 106.240 Section... Requirements § 106.240 Communications. (a) The Facility Security Officer (FSO) must have a means to effectively notify OCS facility personnel of changes in security conditions at the OCS facility. (b) Communication...
33 CFR 106.240 - Communications.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Communications. 106.240 Section... Requirements § 106.240 Communications. (a) The Facility Security Officer (FSO) must have a means to effectively notify OCS facility personnel of changes in security conditions at the OCS facility. (b) Communication...
33 CFR 106.240 - Communications.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Communications. 106.240 Section... Requirements § 106.240 Communications. (a) The Facility Security Officer (FSO) must have a means to effectively notify OCS facility personnel of changes in security conditions at the OCS facility. (b) Communication...
33 CFR 106.240 - Communications.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Communications. 106.240 Section... Requirements § 106.240 Communications. (a) The Facility Security Officer (FSO) must have a means to effectively notify OCS facility personnel of changes in security conditions at the OCS facility. (b) Communication...
17 CFR 37.8 - Information relating to transactions on derivatives transaction execution facilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Information relating to transactions on derivatives transaction execution facilities. 37.8 Section 37.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.8...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Appeals. 27.345 Section 27.345 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.345 Appeals. (a) Right to Appeal. A facility or any person who has received an...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Appeals. 27.345 Section 27.345 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.345 Appeals. (a) Right to Appeal. A facility or any person who has received an...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Appeals. 27.345 Section 27.345 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.345 Appeals. (a) Right to Appeal. A facility or any person who has received an...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Appeals. 27.345 Section 27.345 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.345 Appeals. (a) Right to Appeal. A facility or any person who has received an...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Appeals. 27.345 Section 27.345 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.345 Appeals. (a) Right to Appeal. A facility or any person who has received an...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-09
..., such as social security numbers, home addresses, or home phone numbers in their filings, unless an NRC... range monitoring (APRM) system ``Upscale'' and ``Inoperative'' scram and control rod withdrawal block...
Benizri, F; Balladur, E; Darse, J; Guérin, J; Boudy, V; Echard, M; Brodin, M; Hagenmüller, J B; Prognon, P; Bonan, B
2010-09-01
While home-based chemotherapy improves comfort and quality of life of patients, quality and safety conditions must be equivalent to hospital settings. In addition, organization is much more complex. At the hospital at home "Assistance publique-Hôpitaux de Paris", prescribers are potentially spread across 21 health facilities. The administration of chemotherapy is performed by about 300 nurses at the patient's home in Paris and its suburbs. Centralized preparations of chemotherapy began in September 2009 by the pharmacy department of Georges-Pompidou European hospital, with a progressive increase of the activity. This article describes the quality insurance system established with this new organization to meet the specific challenges of home therapy: choice of eligible anticancer drugs, computerized information systems and networking with other heath facilities, secure transport conditions, traceability from the prescription to the administration, security of administration. This experience can offer an important support for other centres in their approach of quality insurance for home chemotherapy.
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance
Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti
2010-01-01
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.
Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti
2010-01-01
Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.
Minorities in the Juvenile Justice System. 1999 National Report Series. Juvenile Justice Bulletin.
ERIC Educational Resources Information Center
Department of Justice, Washington, DC. Office of Juvenile Justice and Delinquency Prevention.
This report provides data on minorities in the juvenile justice system. Minority juveniles are significantly over-represented in the juvenile justice system. In 1997, minorities made up about one-third of the juvenile population nationwide but accounted for nearly two-thirds of the detained and committed population in secure juvenile facilities.…
Code of Federal Regulations, 2010 CFR
2010-07-01
... must be written in English and in any other language predominant in the area surrounding the facility...) for discussion of security requirements at disposal facilities during the post-closure care period...
Code of Federal Regulations, 2010 CFR
2010-07-01
... must be written in English and in any other language predominant in the area surrounding the facility...) for discussion of security requirements at disposal facilities during the post-closure care period...
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
The Orion Exploration Mission-1 (EM-1) structural test article, inside its transport container, is secured in NASA's Super Guppy aircraft at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
The Orion Exploration Mission-1 (EM-1) structural test article, secured inside its transport container, is loaded into NASA's Super Guppy aircraft at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Iraqi Army Facilities Under the Iraq Security Forces Fund, Diyanah and Debecha, Iraq
2008-01-17
reinforcement bars and cast each building’s roof flatwork and horizontal beams to complete the structural aspects of the roof system . Steel header...included a mix of new construction and renovation of existing structures and facilities. The Statement of Requirements and Specifications provided...that renovation of existing structures , when possible, was preferred. In addition, the United States government encouraged the contractor to use
Security model for picture archiving and communication systems.
Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K
2000-05-01
The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.
33 CFR 106.200 - Owner or operator.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., the OCS facility owner or operator must: (1) Define the security organizational structure for each OCS facility and provide each person exercising security duties or responsibilities within that structure the...
The Ambulatory Care Workload Management System for Nursing Reference Manual
1991-05-31
MEDICAL DATA SERVICES CENTER BETHESDA, MARYLAND 2088Q-506. 91-03029 SECuRItY CLASSIFICATION OF THIS PAGEr REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY...ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION Naval Medical Data Servics (If applicable) Center 6c. ADDRESS (City, State, and ZIPCode) 7b...staffing methodology developed for emergency and ambulatory care departments in naval medical treatment facilities . The staffing model translates varying
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-20
...). The proposed amendment would approve the cyber security plan and implementation schedule, and revise... maintain in effect all provisions of the NRC-approved cyber security plan. Basis for proposed no... [facility operating license] to implement and maintain a Cyber Security Plan as part of Energy Northwest's...
Fisher, Ronald E; Norman, Michael
2010-07-01
The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... maps, security plans, etc.); and Actual or suspected cyber-attacks that could impact pipeline... suspected attacks on pipeline systems, facilities, or assets; Bomb threats or weapons of mass destruction...
Cybersecurity for a Modern Grid - Video Text Version | Energy Systems
got the facilities and the capability, and the people that really understand where the grid is evolving. I think many people are focused on securing today's grid...we're gonna be focused on
Safety and Security Interface Technology Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less
Accelerators for Discovery Science and Security applications
NASA Astrophysics Data System (ADS)
Todd, A. M. M.; Bluem, H. P.; Jarvis, J. D.; Park, J. H.; Rathke, J. W.; Schultheiss, T. J.
2015-05-01
Several Advanced Energy Systems (AES) accelerator projects that span applications in Discovery Science and Security are described. The design and performance of the IR and THz free electron laser (FEL) at the Fritz-Haber-Institut der Max-Planck-Gesellschaft in Berlin that is now an operating user facility for physical chemistry research in molecular and cluster spectroscopy as well as surface science, is highlighted. The device was designed to meet challenging specifications, including a final energy adjustable in the range of 15-50 MeV, low longitudinal emittance (<50 keV-psec) and transverse emittance (<20 π mm-mrad), at more than 200 pC bunch charge with a micropulse repetition rate of 1 GHz and a macropulse length of up to 15 μs. Secondly, we will describe an ongoing effort to develop an ultrafast electron diffraction (UED) source that is scheduled for completion in 2015 with prototype testing taking place at the Brookhaven National Laboratory (BNL) Accelerator Test Facility (ATF). This tabletop X-band system will find application in time-resolved chemical imaging and as a resource for drug-cell interaction analysis. A third active area at AES is accelerators for security applications where we will cover some top-level aspects of THz and X-ray systems that are under development and in testing for stand-off and portal detection.
A secure mobile multimedia system to assist emergency response teams.
Belala, Yacine; Issa, Omneya; Gregoire, Jean-Charles; Wong, James
2008-08-01
Long wait times after injury and greater distances to travel between accident scenes and medical facilities contribute to increased, possibly unnecessary deaths. This paper describes a mobile emergency system aimed at reducing mortality by improving the readiness of hospital personnel, therefore allowing for more efficient treatment procedures to be performed when the victim arrives. The system is designed to provide a secure transmission of voice, medical data, and video in real-time over third-generation cellular networks. Test results obtained on a commercial network under real-life conditions demonstrate the ability to effectively transmit medical data over 3G networks, making them a viable option available to healthcare professionals.
Phua, Kai-Lit
2015-01-01
In the twenty-first century, climate change is emerging as a significant threat to the health and well-being of the public through links to the following: extreme weather events, sea level rise, temperature-related illnesses, air pollution patterns, water security, food security, vector-borne infectious diseases, and mental health effects (as a result of extreme weather events and climate change-induced population displacement). This article discusses how national healthcare systems can be redesigned through changes in its components such as human resources, facilities and technology, health information system, and health policy to meet these challenges.
Selection, training and retention of an armed private security department.
Hollar, David B
2009-01-01
To arm or not to arm security officers? One hospital which has opted for arming its officers is Cook Children's Healthcare System, Fort Worth, TX, an integrated pediatric healthcare facility with over 4000 employees. Because of its location in a major metropolitan area and based on several factors including demographics, exterior risk assessments and crime statistics, the hospital's Administration and its Risk Manager supported the decision to operate as an armed security force, according to the author. In this article he shares its current program and presents some thoughts and ideas that may benefit others who are considering this important step.
When a School Burns, Cool Heads and Quick Action Keep Education on Track.
ERIC Educational Resources Information Center
Parry, Robert; Burris, Carol
1988-01-01
A fire destroyed an elementary school in the East Rockaway (New York) school system. A substitute facility, furniture, and textbooks were secured and classes opened, missing only four school days. Future precautions include insurance to cover actual reconstruction costs, smoke detectors, and a computerized inventory system. (MLF)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-07
... facility or system which the Exchange operates or controls. The Exchange believes that the fee is... system, and, in general, protect investors and the public interest. The Exchange believes the proposed... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66284; File No. SR-Phlx-2012-04] Self...
A terrorism response plan for hospital security and safety officers.
White, Donald E
2002-01-01
Security and Safety managers in today's healthcare facilities need to factor terrorism response into their emergency management plans, separate from the customary disaster plans and the comparatively recent security plans. Terrorism incidents will likely be security occurrences that use a weapon of mass destruction to magnify the incidents into disasters. Facility Y2K Plans can provide an excellent framework for the detailed contingency planning needed for terrorism response by healthcare facilities. Tabbed binder notebooks, with bulleted procedures and contact points for each functional section, can provide security and safety officers with at-a-glance instructions for quick 24/7 implementation. Each functional section should focus upon what activities or severity levels trigger activation of the backup processes. Network with your countywide, regional, and/or state organizations to learn what your peers are doing. Comprehensively inventory your state, local, and commercial resources so that you have alternate providers readily available 24/7 to assist your facility upon disasters.
A Medical Decision Support System for the Space Station Health Maintenance Facility
Ostler, David V.; Gardner, Reed M.; Logan, James S.
1988-01-01
NASA is developing a Health Maintenance Facility (HMF) to provide the equipment and supplies necessary to deliver medical care in the Space Station. An essential part of the Health Maintenance Facility is a computerized Medical Decision Support System (MDSS) that will enhance the ability of the medical officer (“paramedic” or “physician”) to maintain the crew's health, and to provide emergency medical care. The computer system has four major functions: 1) collect and integrate medical information into an electronic medical record from Space Station medical officers, HMF instrumentation, and exercise equipment; 2) provide an integrated medical record and medical reference information management system; 3) manage inventory for logistical support of supplies and secure pharmaceuticals; 4) supply audio and electronic mail communications between the medical officer and ground based flight surgeons. ImagesFigure 1
32 CFR 148.5 - Identification of the security policy board.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...
32 CFR 148.5 - Idenfification of the security policy board.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Idenfification of the security policy board. Agencies...
32 CFR 148.5 - Identification of the security policy board.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...
32 CFR 148.5 - Idenfification of the security policy board.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Idenfification of the security policy board. Agencies...
32 CFR 148.5 - Identification of the security policy board.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Emery, Robert J
2012-11-01
Faced with the prospect of being unable to permanently dispose of low-level radioactive wastes (LLRW) generated from teaching, research, and patient care activities, component institutions of the University of Texas System worked collaboratively to create a dedicated interim storage facility to be used until a permanent disposal facility became available. Located in a remote section of West Texas, the University of Texas System Interim Storage Facility (UTSISF) was licensed and put into operation in 1993, and since then has provided safe and secure interim storage for up to 350 drums of dry solid LLRW at any given time. Interim storage capability provided needed relief to component institutions, whose on-site waste facilities could have possibly become overburdened. Experiences gained from the licensing and operation of the site are described, and as a new permanent LLRW disposal facility emerges in Texas, a potential new role for the storage facility as a surge capacity storage site in times of natural disasters and emergencies is also discussed.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...
Reducing the Risk of Dangerous Chemicals Getting into the Wrong Hands
ERIC Educational Resources Information Center
Matthews, Nancy
2008-01-01
Under the Department of Homeland Security (DHS) Appropriations Act of 2007, DHS has the authority and funding to regulate security at facilities storing chemicals considered to be high-risk (P. L. 109-295, Section 550). This article discusses the Department's efforts to enhance the security of facilities that store chemicals that could be stolen…
Flynt, Elizabeth; Dupuy, Aubry; Kennedy, Charles; Bennett, Shanda
2006-09-01
The rapid detection of contaminants in our nation's drinking water has become a top homeland security priority in this time of increased national vigilance. Real-time monitoring of drinking water for deliberate or accidental contamination is key to national security. One method that can be employed for the rapid screening of pollutants in water is solid-phase microextraction (SPME). SPME is a rapid, sensitive, solvent-free system that can be used to screen for contaminants that have been accidentally or intentionally introduced into a water system. A method using SPME has been developed and optimized for the detection of seven organophosphate pesticides in drinking water treatment facility source waters. The method is tested in source waters for drinking water treatment facilities in Mississippi and Alabama. Water is collected from a deepwater well at Stennis Space Center (SSC), MS, the drinking water source for SSC, and from the Converse Reservoir, the main drinking water supply for Mobile, AL. Also tested are samples of water collected from the Mobile Alabama Water and Sewer System drinking water treatment plant prior to chlorination. The method limits of detection for the seven organophosphates were comparable to those described in several Environmental Protection Agency standard methods. They range from 0.25 to 0.94 microg/L.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
On the tarmac at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida, the Orion Exploration Mission-1 (EM-1) structural test article, secured in its transport container, is loaded into the agency's Super Guppy aircraft. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
On the tarmac at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida, the agency's Super Guppy aircraft closes after the Orion Exploration Mission-1 (EM-1) structural test article, in its transport container, is secured inside. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
The Orion Exploration Mission-1 (EM-1) structural test article, secured inside its transport container, arrives at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The test article will be loaded into NASA's Super Guppy aircraft, in view at left, and transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
European Service Module Structural Test Article Load onto Guppy for Transport to Denver Colorado
2017-06-23
At Kennedy Space Center's Shuttle Landing Facility in Florida, workers move the Orion service module structural test article for Exploration Mission-1 (EM-1), built by the European Space Agency, inside NASA's Super Guppy aircraft. The module is secured inside the aircraft and shipped to Lockheed Martin's Denver facility to undergo testing. The Orion spacecraft will launch atop the agency's Space Launch System rocket on EM-1 in 2019
MAINTENANCE MANAGEMENT ACCOUNTING SYSTEM OF WASTE WATER DISPOSAL SYSTEMS
NASA Astrophysics Data System (ADS)
Hori, Michihiro; Tsuruta, Takashi; Kaito, Kiyoyuki; Kobayashi, Kiyoshi
Sewage works facilities consist of various assets groups. And there are many kinds of financial resources. In order to optimize the maintenance plan, and to secure the stability and sustainability of sewage works management, it is necessary to carry out financial simulation based on the life-cycle cost analysis. Furthermore, it is important to develop management accounting system that is interlinked with the financial accounting system, because many sewage administration bodies have their financial accounting systems as public enterprises. In this paper, a management accounting system, which is designed to provide basic information for asset management of sewage works facilities, is presented. Also the applicability of the management accounting system presented in this paper is examined through financial simulations.
Making a Comeback in the New Century.
ERIC Educational Resources Information Center
Sturgeon, Julie
2001-01-01
Reveals how Ohio's Central State University avoided state closure with a bold mission to rebuild both the academic programs and the facilities. What the new century holds for maintenance, software, card systems, contract services, and security and online purchasing are discussed. (GR)
Disaster Response and Preparedness Application: Emergency Environmental Response Tool (EERT)
NASA Technical Reports Server (NTRS)
Smoot, James; Carr, Hugh; Jester, Keith
2003-01-01
In 2000, the National Aeronautics and Space Administration (NASA) Environmental Office at the John C. Stennis Space Center (SSC) developed an Environmental Geographic Information Systems (EGIS) database. NASA had previously developed a GIS database at SSC to assist in the NASA Environmental Office's management of the Center. This GIS became the basis for the NASA-wide EGIS project, which was proposed after the applicability of the SSC database was demonstrated. Since its completion, the SSC EGIS has aided the Environmental Office with noise pollution modeling, land cover assessment, wetlands delineation, environmental hazards mapping, and critical habitat delineation for protected species. At SSC, facility management and safety officers are responsible for ensuring the physical security of the facilities, staff, and equipment as well as for responding to environmental emergencies, such as accidental releases of hazardous materials. All phases of emergency management (planning, mitigation, preparedness, and response) depend on data reliability and system interoperability from a variety of sources to determine the size and scope of the emergency operation. Because geospatial data are now available for all NASA facilities, it was suggested that this data could be incorporated into a computerized management information program to assist facility managers. The idea was that the information system could improve both the effectiveness and the efficiency of managing and controlling actions associated with disaster, homeland security, and other activities. It was decided to use SSC as a pilot site to demonstrate the efficacy of having a baseline, computerized management information system that ultimately was referred to as the Emergency Environmental Response Tool (EERT).
21 CFR 1301.77 - Security controls for freight forwarding facilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... subject to continuous monitoring by security personnel will be deemed to meet the requirements of Section... forwarding facility must be packed in sealed, unmarked shipping containers. [65 FR 44678, July 19, 2000; 65...
21 CFR 1301.77 - Security controls for freight forwarding facilities.
Code of Federal Regulations, 2012 CFR
2012-04-01
... subject to continuous monitoring by security personnel will be deemed to meet the requirements of Section... forwarding facility must be packed in sealed, unmarked shipping containers. [65 FR 44678, July 19, 2000; 65...
21 CFR 1301.77 - Security controls for freight forwarding facilities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... subject to continuous monitoring by security personnel will be deemed to meet the requirements of Section... forwarding facility must be packed in sealed, unmarked shipping containers. [65 FR 44678, July 19, 2000; 65...
21 CFR 1301.77 - Security controls for freight forwarding facilities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... subject to continuous monitoring by security personnel will be deemed to meet the requirements of Section... forwarding facility must be packed in sealed, unmarked shipping containers. [65 FR 44678, July 19, 2000; 65...
21 CFR 1301.77 - Security controls for freight forwarding facilities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... subject to continuous monitoring by security personnel will be deemed to meet the requirements of Section... forwarding facility must be packed in sealed, unmarked shipping containers. [65 FR 44678, July 19, 2000; 65...
Amini, Afshin; Dindoost, Payam; Moghimi, Mehrdad; Kariman, Hamid; Shahrami, Ali; Dolatabadi, Ali Arhami; Ali-Mohammadi, Hossein; Alavai-Moghaddam, Mostafa; Derakhshanfar, Hojjat; Hatamabadi, HamidReza; Heidari, Kamran; Alamdari, Shahram; Meibodi, Mohammad Kalantar; Shojaee, Majid; Foroozanfar, Mohammad Mehdi; Hashemi, Behrooz; Sabzeghaba, Anita; Kabir, Ali
2012-02-01
To assess the deficiencies and potential areas through a medical audit of the emergency departments, in six general hospitals affiliated to Shahid Beheshti University of Medical Sciences at Tehran, Iran, after preparing specific wards-based international standards. A checklist was completed for all hospitals which met our eligibility criteria mainly observation and interviews with head nurses and managers of the emergency medicine unit of the hospitals before (2003) and after (2008) the establishment of emergency departments there. Domains studied included staffing, education and continuing professional development (CPD), facility (design), equipment, ancillary services, medical records, manuals and references, research, administration, pre-hospital care, information systems, disaster planning, bench-marking and hospital accreditation. Education and CPD (p = 0.042), design and facility (p = 0.027), equipment (p = 0.028), and disaster (p = 0.026) had significantly improved after the establishment of emergency departments. Nearly all domains showed a positive change though it was non-significant in a few. In terms of observation, better improvement was seen in disaster, security, design, and research. According to the score for each domain compared to what it was in the earlier phase, better improvement was observed in hospital accreditation, information systems, security, disaster planning, and research. Security, disaster planning, research, design and facility had improved in hospitals that wave studied, while equipment, records, ancillary services, administration and bench-marking had the lowest improvement even after the establishment of emergency department, and, hence, needed specific attention.
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
MATALUCCI,RUDOLPH V.; O'CONNOR,SHARON
The mission of the Architectural Surety{trademark} program at Sandia National Laboratories is to assure the performance of buildings, facilities, and other infrastructure systems under normal, abnormal, and malevolent threat conditions. Through educational outreach efforts in the classroom, at conferences, and presentations such as this one, public and professional awareness of the need to defuse and mitigate such threats is increased. Buildings, airports, utilities, and other kinds of infrastructure deteriorate over time, as evidenced most dramatically by the crumbling cities and aging buildings, bridges, and other facility systems. Natural disasters such as tornadoes, earthquakes, hurricanes, and flooding also stress the materialsmore » and structural elements of the built environment. In addition, criminals, vandals, and terrorists attack federal buildings, dams, bridges, tunnels, and other public and private facilities. Engineers and architects are beginning to systematically consider these threats during the design, construction, and retrofit phases of buildings and infrastructures and are recommending advanced research in new materials and techniques. Existing building codes and standards do not adequately address nor protect the infrastructure or the public from many of these emerging threats. The activities in Sandia National Laboratories' Architectural Surety{trademark} efforts take a risk management approach to enhancing the safety, security, and reliability of the constructed environment. The technologies and techniques developed during Sandia's 50 years as the nation's lead laboratory for nuclear weapons surety are now being applied to assessing and reducing the vulnerability of dams, to enhancing the safety and security of staff in foreign embassies, and assuring the reliability of other federal facilities. High consequence surety engineering and design brings together technological advancements, new material requirements, systems integration, and risk management to improve the safety, security, and reliability of the as-built environment. The thrust of this paper is the role that new materials can play in protecting the infrastructure. Retrofits of existing buildings, innovative approaches to the design and construction of new facilities, and the mitigation of consequences in the event of an unpreventable disaster are some of the areas that new construction materials can benefit the Architectural Surety{trademark} of the constructed environment.« less
32 CFR Appendix A to Part 223 - Procedures for Identifying and Controlling DoD UCNI
Code of Federal Regulations, 2010 CFR
2010-07-01
... security measures, including security plans, procedures, and equipment, for the physical protection of DoD... sabotage of DoD SNM, equipment, or facilities (e.g., relative importance of a facility or the location... equipment, for the physical protection of DoD SNM, equipment, or facilities. c. Meet the adverse effects...
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCallen, David; Petrone, Floriana; Buckle, Ian
The U.S. Department of Energy (DOE) has ownership and operational responsibility for a large enterprise of nuclear facilities that provide essential functions to DOE missions ranging from national security to discovery science and energy research. These facilities support a number of DOE programs and offices including the National Nuclear Security Administration, Office of Science, and Office of Environmental Management. With many unique and “one of a kind” functions, these facilities represent a tremendous national investment, and assuring their safety and integrity is fundamental to the success of a breadth of DOE programs. Many DOE critical facilities are located in regionsmore » with significant natural phenomenon hazards including major earthquakes and DOE has been a leader in developing standards for the seismic analysis of nuclear facilities. Attaining and sustaining excellence in nuclear facility design and management must be a core competency of the DOE. An important part of nuclear facility management is the ability to monitor facilities and rapidly assess the response and integrity of the facilities after any major upset event. Experience in the western U.S. has shown that understanding facility integrity after a major earthquake is a significant challenge which, lacking key data, can require extensive effort and significant time. In the work described in the attached report, a transformational approach to earthquake monitoring of facilities is described and demonstrated. An entirely new type of optically-based sensor that can directly and accurately measure the earthquake-induced deformations of a critical facility has been developed and tested. This report summarizes large-scale shake table testing of the sensor concept on a representative steel frame building structure, and provides quantitative data on the accuracy of the sensor measurements.« less
Integrated homeland security system with passive thermal imaging and advanced video analytics
NASA Astrophysics Data System (ADS)
Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert
2007-04-01
A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.
Secure Reliable Processing Systems
1984-02-21
be attainable in principle, the more difficult goal is to meet all of the above while still maintaining good performance within the framwork of a well...managing the network, the user sees a conceptually simpler storage facility, composed merely of files, without machine boundaries, replicated copies
QUALITY ASSURANCE AND QUALITY CONTROL FOR WASTE CONTAINMENT FACILITIES. Project Summary
It is generally agreed that both quality assurance (QA) and quality control (QC) are essential to the proper installation and eventual performance of environmentally safe and secure waste containment systems. Even further, there are both manufacturing and construction aspects to...
05-NIF Dedication: Tom D'Agostino
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tom D'Agostino,
2009-07-02
The National Ignition Facility, the world's largest laser system, was dedicated at a ceremony on May 29, 2009 at Lawrence Livermore National Laboratory. These are the remarks by Tom D'Agostino, the administrator of the U.S. Department of Energy's National Nuclear Security Administration.
75 FR 22675 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-29
... expansion. Security screening expansion. Terminal restroom design. Terminal restroom remodel. Terminal... remodeling. Pavement management system. Master plan, phase 1. Decision Date: September 23, 2009. FOR FURTHER... modifications, passenger terminal. Rehabilitation of taxilane K-1. Design and implement noise mitigation...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES... secure a room reservation, prior to the beginning of an employee's scheduled official travel. However, if...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES... secure a room reservation, prior to the beginning of an employee's scheduled official travel. However, if...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES... secure a room reservation, prior to the beginning of an employee's scheduled official travel. However, if...
NASA Technical Reports Server (NTRS)
1983-01-01
Science and applications, NOAA environmental observation, commercial resource observations, commercial space processing, commercial communications, national security, technology development, and GEO servicing are addressed. Approach to time phasing of mission requirements, system sizing summary, time-phased user mission payload support, space station facility requirements, and integrated time-phased system requirements are also addressed.
Computerized Vocational Information and Decision-Making in Secured Environments in New York State.
ERIC Educational Resources Information Center
Heller, Barbara R.; Gross, Linda Chitayat
A study was conducted on the use of the Guidance Information System (GIS), an on-line computer information retrieval system for occupational, two-year college, four-year college, and scholarship and financial aid information, in four detention/correctional facilities in New York. These were the Queens House of Detention for Men (QHDM), Brooklyn…
Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach
ERIC Educational Resources Information Center
Oakes, Charles G.
2010-01-01
The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
To meet the U.S. Navy's energy goals, the National Renewable Energy Laboratory (NREL) and the Naval Facilities Engineering Command (NAVFAC) spent two years collaborating on demonstrations that tested market-ready energy efficiency measures, renewable energy generation, and energy systems integration. One such technology - an energy management system - was identified as a promising method for reducing energy use and costs, and can contribute to increasing energy security.
Cyber Security Testing and Training Programs for Industrial Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daniel Noyes
2012-03-01
Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sexton, L.
2012-06-06
Environmental sampling has become a key component of International Atomic Energy Agency (IAEA) safeguards approaches since its approval for use in 1996. Environmental sampling supports the IAEA's mission of drawing conclusions concerning the absence of undeclared nuclear material or nuclear activities in a Nation State. Swipe sampling is the most commonly used method for the collection of environmental samples from bulk handling facilities. However, augmenting swipe samples with an air monitoring system, which could continuously draw samples from the environment of bulk handling facilities, could improve the possibility of the detection of undeclared activities. Continuous sampling offers the opportunity tomore » collect airborne materials before they settle onto surfaces which can be decontaminated, taken into existing duct work, filtered by plant ventilation, or escape via alternate pathways (i.e. drains, doors). Researchers at the Savannah River National Laboratory and Oak Ridge National Laboratory have been working to further develop an aerosol collection technology that could be installed at IAEA safeguarded bulk handling facilities. The addition of this technology may reduce the number of IAEA inspector visits required to effectively collect samples. The principal sample collection device is a patented Aerosol Contaminant Extractor (ACE) which utilizes electrostatic precipitation principles to deposit particulates onto selected substrates. Recent work has focused on comparing traditional swipe sampling to samples collected via an ACE system, and incorporating tamper resistant and tamper indicating (TRI) technologies into the ACE system. Development of a TRI-ACE system would allow collection of samples at uranium/plutonium bulk handling facilities in a manner that ensures sample integrity and could be an important addition to the international nuclear safeguards inspector's toolkit. This work was supported by the Next Generation Safeguards Initiative (NGSI), Office of Nonproliferation and International Security (NIS), National Nuclear Security Administration (NNSA).« less
Code of Federal Regulations, 2013 CFR
2013-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM... analyze key data from chemical facilities. Chemical-terrorism Vulnerability Information or CVI shall mean... or terrorist incident shall mean any incident or attempt that constitutes terrorism or terrorist...
33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in compliance with the security requirements in this part for the MARSEC Level in effect for the OCS..., and stress the need for increased vigilance. (d) An OCS facility owner or operator whose facility is...
Large-Scale Cryogen Systems and Test Facilities
NASA Technical Reports Server (NTRS)
Johnson, R. G.; Sass, J. P.; Hatfield, W. H.
2007-01-01
NASA has completed initial construction and verification testing of the Integrated Systems Test Facility (ISTF) Cryogenic Testbed. The ISTF is located at Complex 20 at Cape Canaveral Air Force Station, Florida. The remote and secure location is ideally suited for the following functions: (1) development testing of advanced cryogenic component technologies, (2) development testing of concepts and processes for entire ground support systems designed for servicing large launch vehicles, and (3) commercial sector testing of cryogenic- and energy-related products and systems. The ISTF Cryogenic Testbed consists of modular fluid distribution piping and storage tanks for liquid oxygen/nitrogen (56,000 gal) and liquid hydrogen (66,000 gal). Storage tanks for liquid methane (41,000 gal) and Rocket Propellant 1 (37,000 gal) are also specified for the facility. A state-of-the-art blast proof test command and control center provides capability for remote operation, video surveillance, and data recording for all test areas.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
A view from inside NASA's Super Guppy aircraft at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida, as the Orion Exploration Mission-1 (EM-1) structural test article, secured inside its transport container, is loaded into the aircraft. The test article will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Computer validation in toxicology: historical review for FDA and EPA good laboratory practice.
Brodish, D L
1998-01-01
The application of computer validation principles to Good Laboratory Practice is a fairly recent phenomenon. As automated data collection systems have become more common in toxicology facilities, the U.S. Food and Drug Administration and the U.S. Environmental Protection Agency have begun to focus inspections in this area. This historical review documents the development of regulatory guidance on computer validation in toxicology over the past several decades. An overview of the components of a computer life cycle is presented, including the development of systems descriptions, validation plans, validation testing, system maintenance, SOPs, change control, security considerations, and system retirement. Examples are provided for implementation of computer validation principles on laboratory computer systems in a toxicology facility.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morellas, Vassilios; Johnson, Andrew; Johnston, Chris
2006-07-01
Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff andmore » landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)« less
78 FR 27472 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... Approved For Collection And Use: Airfield lighting and vault. Runway 21 extension--preliminary design...--80 facility modification design and build-out. Access control enhancements. Security fence replacement. Airfield pavement survey. Jet bridge refurbishment. Security checkpoint modification. Friction...
Obesity: A Threat to National Security?
2011-03-16
year 2002, the military health care system spent more than $15 million for bariatric surgeries in civilian and military facilities. 60 According to...in costly liposuction surgery to meet the Army‟s weight standards to avoid losing their careers.55 Health experts are saying that these extreme
Managing a Crisis for School Security
ERIC Educational Resources Information Center
Badzmierowski, William F.
2011-01-01
In recent years, campus tragedies across the country have prompted leaders of education institutions to redouble their crisis planning efforts. Too often, however, these emergency plans focus almost exclusively on facilities, hardware and systems without sufficient consideration for the people they potentially affect. People, not equipment, will…
Szymanski, Jacek; Wilson, David L; Zhang, Guo-Qiang
2009-10-01
The rapid expansion of biomedical research has brought substantial scientific and administrative data management challenges to modern core facilities. Scientifically, a core facility must be able to manage experimental workflow and the corresponding set of large and complex scientific data. It must also disseminate experimental data to relevant researchers in a secure and expedient manner that facilitates collaboration and provides support for data interpretation and analysis. Administratively, a core facility must be able to manage the scheduling of its equipment and to maintain a flexible and effective billing system to track material, resource, and personnel costs and charge for services to sustain its operation. It must also have the ability to regularly monitor the usage and performance of its equipment and to provide summary statistics on resources spent on different categories of research. To address these informatics challenges, we introduce a comprehensive system called MIMI (multimodality, multiresource, information integration environment) that integrates the administrative and scientific support of a core facility into a single web-based environment. We report the design, development, and deployment experience of a baseline MIMI system at an imaging core facility and discuss the general applicability of such a system in other types of core facilities. These initial results suggest that MIMI will be a unique, cost-effective approach to addressing the informatics infrastructure needs of core facilities and similar research laboratories.
ERIC Educational Resources Information Center
Gagnon, Joseph C.; Read, Nicholas W.; Gonsoulin, Simon
2015-01-01
Access to high-quality education for youth is critical to their long-term success as adults. Youth in juvenile justice secure care facilities, however, too often do not have access to the high-quality education and related supports and services that they need, particularly youth with disabilities residing in such facilities. This brief discusses…
28 CFR 540.41 - Visiting facilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Visiting facilities. 540.41 Section 540.41 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INSTITUTIONAL MANAGEMENT CONTACT... visitors. (a) Institutions of minimum and low security levels may permit visits beyond the security...
49 CFR 374.309 - Terminal facilities.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Passenger security. All terminals and stations must provide adequate security for passengers and their attendants and be regularly patrolled. (b) Outside facilities. At terminals and stations that are closed when... accommodations, and telephone numbers for local taxi service and police. (c) Maintenance. Terminals shall be...
Creation of security engineering programs by the Southwest Surety Institute
NASA Astrophysics Data System (ADS)
Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn
1998-12-01
The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.
33 CFR 105.145 - Maritime Security (MARSEC) Directive.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...
ERIC Educational Resources Information Center
Nilsson, Fredrik
2004-01-01
In response to this growing trend, an increasing number of schools nationwide are implementing video surveillance systems in an effort to improve student and faculty safety. The United States currently has about 100,000 schools, and only 16% of these facilities have some form of video surveillance system in place. While this figure demonstrates…
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
As part of the U.S. Navy's overall energy strategy, the National Renewable Energy Laboratory (NREL) partnered with the Naval Facilities Engineering Command (NAVFAC) to demonstrate market-ready energy efficiency measures, renewable energy generation, and energy systems integration. One such technology - retrofitting rooftop air-conditioning units with an advanced rooftop control system - was identified as a promising source for reducing energy use and costs, and can contribute to increasing energy security.
CMS Software: Installation Guide and User Manual.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Straut, Christine
A Chemical Inventory Management System (CIMS) is a system or program that is used to track chemicals at a facility or institution. An effective CIMS begins tracking these chemicals at the point of procurement and continues through use and disposal. The management of chemicals throughout the life cycle (procurement to disposal) is a key concept for the secure management of chemicals at any institution.
Orion EM-1 Crew Module Structural Test Article loaded onto Guppy
2017-04-25
The Orion Exploration Mission-1 (EM-1) structural test article, secured inside its transport container, is lifted up by crane from its transport vehicle at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The test article will be loaded into NASA's Super Guppy aircraft, in view at left, and transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.
Critical Issues of Web-Enabled Technologies in Modern Organizations.
ERIC Educational Resources Information Center
Khosrow-Pour, Mehdi; Herman, Nancy
2001-01-01
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
03-NIF Dedication: Norm Pattiz
DOE Office of Scientific and Technical Information (OSTI.GOV)
Norm Pattiz
2009-07-02
The National Ignition Facility, the world's largest laser system, was dedicated at a ceremony on May 29, 2009 at Lawrence Livermore National Laboratory. These are the remarks by Norm Pattiz, the chairman of Lawrence Livermore National Security, which manages Lawrence Livermore National Laboratory for the U.S. Department of Energy.
The President’s Budget: Overview of Structure and Timing of Submission to Congress
2013-07-25
Nuclear Facilities Safety Board, Securities and Exchange Commission, and National Transportation Safety Board) are required by statute to submit...Research Service 4 Governors of the Federal Reserve System, and Federal National Mortgage Association).22 Additionally, certain agencies (e.g., Defense
Instructional Television Facilities: A Planning Guide.
ERIC Educational Resources Information Center
Witherspoon, John P.; Kessler, William J.
When planning an instructional television (ITV) system, it is suggested that educational objectives should outweigh technological considerations and that expert advice be secured before the planning process is far advanced. In line with the latter suggestion, the book offers a background of technical knowledge aimed at educational administrators…
03-NIF Dedication: Norm Pattiz
Norm Pattiz
2017-12-09
The National Ignition Facility, the world's largest laser system, was dedicated at a ceremony on May 29, 2009 at Lawrence Livermore National Laboratory. These are the remarks by Norm Pattiz, the chairman of Lawrence Livermore National Security, which manages Lawrence Livermore National Laboratory for the U.S. Department of Energy.
ERIC Educational Resources Information Center
Bolch, Matt
2008-01-01
For the school chief information officer (CIO), safeguarding students and facilities is as much a part of the job description as keeping the data networks running and the servers protected from hackers. This article describes how two districts, Miami-Dade County Public Schools and Taos Municipal Schools, secured their surveillance systems. The…
Unintended Relevance: The Role of the Stryker Brigade Combat Team in the Decisive Action Environment
2017-05-25
Systems , 30MM 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON Walter C. Gray II...Facilities- Policy FCS Future Combat System FM Field Manual FMTV Family of Medium Tactical Vehicles GCV Ground Combat Vehicle GWOT...Vehicle MGS Mobile Gun System MPF Mobile Protected Firepower NATO North Atlantic Treaty Organization ONS Operational Needs Statement RPG
2004-03-10
KENNEDY SPACE CENTER, FLA. - At the Astrotech Space Operations processing facilities, NASA’s MESSENGER spacecraft is secure after transfer to the work stand. There employees of the Johns Hopkins University Applied Physics Laboratory, builders of the spacecraft, will perform an initial state-of-health check. Then processing for launch can begin, including checkout of the power systems, communications systems and control systems. The thermal blankets will also be attached for flight. MESSENGER - short for MErcury Surface, Space ENvironment, GEochemistry and Ranging - will be launched May 11 on a six-year mission aboard a Boeing Delta II rocket. Liftoff is targeted for 2:26 a.m. EDT on Tuesday, May 11.
Application of the API/NPRA SVA methodology to transportation security issues.
Moore, David A
2006-03-17
Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.
NASA Astrophysics Data System (ADS)
Forcier, Bob
2003-09-01
This paper describes a digital-ultrasonic ground network, which forms an unique "unattended mote sensor system" for monitoring the environment, personnel, facilities, vehicles, power generation systems or aircraft in Counter-Terrorism, Force Protection, Prognostic Health Monitoring (PHM) and other ground applications. Unattended wireless smart sensor/tags continuously monitor the environment and provide alerts upon changes or disruptions to the environment. These wireless smart sensor/tags are networked utilizing ultrasonic wireless motes, hybrid RF/Ultrasonic Network Nodes and Base Stations. The network is monitored continuously with a 24/7 remote and secure monitoring system. This system utilizes physical objects such as a vehicle"s structure or a building to provide the media for two way secure communication of key metrics and sensor data and eliminates the "blind spots" that are common in RF solutions because of structural elements of buildings, etc. The digital-ultrasonic sensors have networking capability and a 32-bit identifier, which provide a platform for a robust data acquisition (DAQ) for a large amount of sensors. In addition, the network applies a unique "signature" of the environment by comparing sensor-to-sensor data to pick up on minute changes, which would signal an invasion of unknown elements or signal a potential tampering in equipment or facilities. The system accommodates satellite and other secure network uplinks in either RF or UWB protocols. The wireless sensors can be dispersed by ground or air maneuvers. In addition, the sensors can be incorporated into the structure or surfaces of vehicles, buildings, or clothing of field personnel.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Security plan. 37.41 Section 37.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS Security at DMVs and Driver's License and Identification Card Production Facilities § 37.41...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2013-10-01 2013-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2011-10-01 2011-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2014-10-01 2014-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2010-10-01 2010-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
49 CFR 1549.5 - Adoption and implementation of the security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... facility must: (1) Maintain an original of the security program at its corporate office. (2) Have... 49 Transportation 9 2012-10-01 2012-10-01 false Adoption and implementation of the security...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CERTIFIED CARGO...
Venipuncture and intravenous infusion access during zero-gravity flight
NASA Technical Reports Server (NTRS)
Krupa, Debra T.; Gosbee, John; Billica, Roger; Bechtle, Perry; Creager, Gerald J.; Boyce, Joey B.
1991-01-01
The purpose of this experiment is to establish the difficulty associated with securing an intravenous (IV) catheter in place in microgravity flight and the techniques applicable in training the Crew Medical Officer (CMO) for Space Station Freedom, as well as aiding in the selection of appropriate hardware and supplies for the Health Maintenance Facility (HMF). The objectives are the following: (1) to determine the difficulties associated with venipuncture in a microgravity environment; (2) to evaluate the various methods of securing an IV catheter and attached tubing for infusion with regard to the unique environment; (3) to evaluate the various materials available for securing an intravenous catheter in place; and (4) to evaluate the fluid therapy administration system when functioning in a complete system. The inflight test procedures and other aspects of the KC-135 parabolic flight test to simulate microgravity are presented.
Krasnyanskaya, T M; Tylets, V G
The present work was designed to address the problem of ensuring the psychological security in the framework of organization of the rehabilitative treatment based at the spa and health resort facilities. We undertook the questionnaire study for which 650 subjects were recruited among those attending spa and health resort facilities of the cities of Essentuki and Kislovodsk. The participants were asked to estimate the level of their personal security and the quality of the provided means for the rehabilitative treatment and general health improvement. It was found that as many as 43% of the respondents reported the moderate level of psychological security whereas about 30% of them estimated the level of their psychological security as low. Overall, the attitude toward the available means for health improvement and rehabilitation proved extremely variable. The factorial analysis has demonstrated the highly subjective opinions of the responders as regards the provided services categorized in terms of therapeutic (mineral water, preformed physical factors, peloid and dietary therapy), health improvement (herbal medicine, therapeutic physical training, therapy, bioclimatic therapy), and recreational (animation, excursion and touristic activities) factors. The value of these factors was perceived differently by the vacationers with different feelings of psychological security. Those reporting the high level of psychological security demonstrated the positive attitude toward all factors and circumstances available for the general improvement of the health status whereas the holidaymakers reporting the moderate level of personal psychological security exhibited the non-equivalent attitude toward the provided services; namely, they highly estimated the available therapeutic factors but either underestimated the value of the constituent components of the health improving and recreational factors or demonstrated the very selective attitude toward their assessment. Generally speaking, the feeling of personal psychological security in the participants of the study reflected their subjective approach to structuralization and differentiation of the factors underlying the effectiveness, final outcome, and psychological security of the spa and health resort-based rehabilitative treatment. The results of the present study give evidence of the paramount importance of personal psychological security as a most important factor contributing to the solution of problems facing the practice of the rehabilitation treatment based at the spa and health resort facilities. This work should be organized taking into consideration the necessity to ensure the feeling of personal security and psychological comfort in the holidaymakers as an indispensable prerequisite for the successful rehabilitative treatment of the vacationers and meeting the requirements of the holidaymakers.
Downgrade of the Savannah River Sites FB-Line
DOE Office of Scientific and Technical Information (OSTI.GOV)
SADOWSKI, ED; YOURCHAK, RANDY; PRETZELLO MARJI
2005-07-05
This paper will discuss the Safeguards & Security (S&S) activities that resulted in the downgrade of the Savannah River Site's FB-Line (FBL) from a Category I Material Balance Area (MBA) in a Material Access Area (MAA) to a Category IV MBA in a Property Protection Area (PPA). The Safeguards activities included measurement of final product items, transferal of nuclear material to other Savannah River Site (SRS) facilities, discard of excess nuclear material items, and final measurements of holdup material. The Security activities included relocation and destruction of classified documents and repositories, decertification of a classified computer, access control changes, updatesmore » to planning documents, deactivation and removal of security systems, Human Reliability Program (HRP) removals, and information security training for personnel that will remain in the FBL PPA.« less
The Zwicky Transient Facility Camera
NASA Astrophysics Data System (ADS)
Dekany, Richard; Smith, Roger M.; Belicki, Justin; Delacroix, Alexandre; Duggan, Gina; Feeney, Michael; Hale, David; Kaye, Stephen; Milburn, Jennifer; Murphy, Patrick; Porter, Michael; Reiley, Daniel J.; Riddle, Reed L.; Rodriguez, Hector; Bellm, Eric C.
2016-08-01
The Zwicky Transient Facility Camera (ZTFC) is a key element of the ZTF Observing System, the integrated system of optoelectromechanical instrumentation tasked to acquire the wide-field, high-cadence time-domain astronomical data at the heart of the Zwicky Transient Facility. The ZTFC consists of a compact cryostat with large vacuum window protecting a mosaic of 16 large, wafer-scale science CCDs and 4 smaller guide/focus CCDs, a sophisticated vacuum interface board which carries data as electrical signals out of the cryostat, an electromechanical window frame for securing externally inserted optical filter selections, and associated cryo-thermal/vacuum system support elements. The ZTFC provides an instantaneous 47 deg2 field of view, limited by primary mirror vignetting in its Schmidt telescope prime focus configuration. We report here on the design and performance of the ZTF CCD camera cryostat and report results from extensive Joule-Thompson cryocooler tests that may be of broad interest to the instrumentation community.
7 CFR 3560.408 - Lease of security property.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 15 2010-01-01 2010-01-01 false Lease of security property. 3560.408 Section 3560.408 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF... facilities related to a housing project (e.g., central kitchens, recreation facilities, laundry rooms, and...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...
33 CFR 127.707 - Security personnel.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security personnel. 127.707 Section 127.707 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.707 Security personnel. The operator...
33 CFR 127.707 - Security personnel.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security personnel. 127.707 Section 127.707 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.707 Security personnel. The operator...
33 CFR 127.707 - Security personnel.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security personnel. 127.707 Section 127.707 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.707 Security personnel. The operator...
33 CFR 127.707 - Security personnel.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security personnel. 127.707 Section 127.707 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... Waterfront Facilities Handling Liquefied Natural Gas Security § 127.707 Security personnel. The operator...
Outdoor Testing Areas | Energy Systems Integration Facility | NREL
of engineers running tests on plug-in hybrid electric vehicles at the Medium-Voltage Outdoor Test large microgrids hub, located in the outdoor low-voltage test yard, includes underground trench access pits for full enclosure of rotating machinery under test. Key Infrastructure Secured underground pits
Code of Federal Regulations, 2010 CFR
2010-10-01
... Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND.... Financial incentives for timely mission accomplishment or cost effectiveness shall never compromise or..., undue risk to the common defense and security. In addition, this category includes performance failures...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND.... Financial incentives for timely mission accomplishment or cost effectiveness shall never compromise or..., undue risk to the common defense and security. In addition, this category includes performance failures...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND.... Financial incentives for timely mission accomplishment or cost effectiveness shall never compromise or..., undue risk to the common defense and security. In addition, this category includes performance failures...
Space lab system analysis: Advanced Solid Rocket Motor (ASRM) communications networks analysis
NASA Technical Reports Server (NTRS)
Ingels, Frank M.; Moorhead, Robert J., II; Moorhead, Jane N.; Shearin, C. Mark; Thompson, Dale R.
1990-01-01
A synopsis of research on computer viruses and computer security is presented. A review of seven technical meetings attended is compiled. A technical discussion on the communication plans for the ASRM facility is presented, with a brief tutorial on the potential local area network media and protocols.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
1996-12-31
There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems;more » (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis.« less
Better protecting staff working alone.
Swindlehurst, Darren
2016-08-01
Established four and a half years ago as a wholly-owned subsidiary of Dutch-headquartered personal security and critical communications solutions provider, Atus BV, Hereford-based Atus Systems has since established a strong UK-wide client base supplying personal pagers, wireless personal alarm units, and the associated infrastructure, predominantly to high secure mental health facilities, prisons, and detention centres. Recent months, however, mark a new chapter for it, with the launch of a 'unique' lone worker protection system able to identify such personnel's location even when they are indoors and out of range of GPS coverage, and a sophisticated two-way enterprise critical messaging system. As HEJ editor, Jonathan Baillie, discovered from MD, Darren Swindlehurst, the company will target both systems squarely at the NHS and private healthcare providers, as well as at its more 'traditional' customers.
Advanced millimeter-wave security portal imaging techniques
NASA Astrophysics Data System (ADS)
Sheen, David M.; Bernacki, Bruce E.; McMakin, Douglas L.
2012-03-01
Millimeter-wave (mm-wave) imaging is rapidly gaining acceptance as a security tool to augment conventional metal detectors and baggage x-ray systems for passenger screening at airports and other secured facilities. This acceptance indicates that the technology has matured; however, many potential improvements can yet be realized. The authors have developed a number of techniques over the last several years including novel image reconstruction and display techniques, polarimetric imaging techniques, array switching schemes, and high-frequency high-bandwidth techniques. All of these may improve the performance of new systems; however, some of these techniques will increase the cost and complexity of the mm-wave security portal imaging systems. Reducing this cost may require the development of novel array designs. In particular, RF photonic methods may provide new solutions to the design and development of the sequentially switched linear mm-wave arrays that are the key element in the mm-wave portal imaging systems. Highfrequency, high-bandwidth designs are difficult to achieve with conventional mm-wave electronic devices, and RF photonic devices may be a practical alternative. In this paper, the mm-wave imaging techniques developed at PNNL are reviewed and the potential for implementing RF photonic mm-wave array designs is explored.
33 CFR 106.225 - Drill and exercise requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Drill and exercise requirements...) Facility Security Requirements § 106.225 Drill and exercise requirements. (a) General. (1) Drills and exercises must test the proficiency of facility personnel in assigned security duties at all MARSEC Levels...
75 FR 31807 - Federal Property Suitable as Facilities To Assist the Homeless; Republication
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-04
.... Albert Johnson, Department of the Navy, Asset Management Division, Naval Facilities Engineering Command..., and 75A Reasons: Secured Area Bldgs. 3550, 3551 Naval Base San Diego CA Landholding Agency: Navy... Reasons: Secured Area Maine Bldgs. B496 and 497 Bangor Internatl Airport Bangor ME 04401 Landholding...
Custodians/Security Program Evaluation.
ERIC Educational Resources Information Center
Ennis, Bob
The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…
Digital watermarking for secure and adaptive teleconferencing
NASA Astrophysics Data System (ADS)
Vorbrueggen, Jan C.; Thorwirth, Niels
2002-04-01
The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.
1999-11-01
Drinking water processing plant , Analysis, Calculation model, Field experiment 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION...sewage effluents and from the sewer of the municipal sewage treatment plant in Berlin-Ruhleben. In the field trials, the MDWPUs that both apply reverse...waste water samples, along the municipal sewer system and In the influents and effluents of the receiving sewage treatment plants . To estimate the