Science.gov

Sample records for national security program

  1. Nevada National Security Site Radiation Protection Program

    SciTech Connect

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  2. Nevada National Security Site Groundwater Program

    ScienceCinema

    None

    2016-07-12

    From 1951 to 1992, the Unites States government conducted 828 underground nuclear tests at the Nevada National Security Site. About one-third of these tests occurred near, below or within the water table - the very top portion of the groundwater layer where rock and soil are completely saturated with water. As a result, some groundwater was contaminated. The U.S. Department of Energy (DOE) began exploring the effects of groundwater contamination in the 1970s. Though contamination from underground testing has never been detected on public land, the DOE was committed to developing an advanced, reliable monitoring network that ensures the long-term protection of the public. An intensive groundwater investigation program was launched in 1989.

  3. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY: Information Security Oversight Office, NARA. ACTION.... This correction assigns a Federal Docket Management System (FDMS) number to the proposed rule...

  4. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held...

  5. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-29

    ... Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... telecommunications policy. The new NSTAC Chair, James Crowe, Chief Executive Officer (CEO), Level 3...

  6. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office, National Archives and Records... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  7. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on July...

  8. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    ERIC Educational Resources Information Center

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  9. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  10. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  11. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    .... SUPPLEMENTARY INFORMATION: This meeting will be open to the public. However, due to space limitations and access... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  12. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program...

  13. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... number of individuals planning to attend must be submitted to the Information Security Oversight Office... Industrial Security Program policy matters. DATES: The meeting will be held on March 20, 2013 from 10:00...

  14. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    .... SUPPLEMENTARY INFORMATION: This meeting will be open to the public. However, due to space limitations and access... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... meeting. To discuss National Industrial Security Program policy matters. DATES: The meeting will be...

  15. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... open to the public. However, due to space limitations and access procedures, the name and telephone... RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy... Industrial Security Program policy matters. DATES: The meeting will be held on November 14, 2012 from 10:00...

  16. A Policy and Program for Invigorating Science and Technology for National Security

    DTIC Science & Technology

    2014-04-01

    balanced to support short-term national security operational needs in addition to enduring security challenges,  establish an efficient management ...agencies, other research agencies and industry, to help develop a new policy and program management framework for achieving a whole-of-government...National security S&T community stakeholders from government, academia and industry are invited to make submissions on the policy and program management

  17. Establishing a national biological laboratory safety and security monitoring program.

    PubMed

    Blaine, James W

    2012-12-01

    The growing concern over the potential use of biological agents as weapons and the continuing work of the Biological Weapons Convention has promoted an interest in establishing national biological laboratory biosafety and biosecurity monitoring programs. The challenges and issues that should be considered by governments, or organizations, embarking on the creation of a biological laboratory biosafety and biosecurity monitoring program are discussed in this article. The discussion focuses on the following questions: Is there critical infrastructure support available? What should be the program focus? Who should be monitored? Who should do the monitoring? How extensive should the monitoring be? What standards and requirements should be used? What are the consequences if a laboratory does not meet the requirements or is not willing to comply? Would the program achieve the results intended? What are the program costs? The success of a monitoring program can depend on how the government, or organization, responds to these questions.

  18. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    EPA Pesticide Factsheets

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  19. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    ERIC Educational Resources Information Center

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  20. National security

    SciTech Connect

    Not Available

    1992-04-01

    This paper summarizes the views presented on October 31, 1991, at a GAO-sponsored conference on worldwide threats to U.S. national security. The conference was designed to provide insight into potential military threats to U.S. security interests and necessary modifications to current and planned U.S. forces to meet those threats. Conference participants, including defense analysts and retired military officers, discussed and analyzed the possibility of U.S. and allied involvement in various regional contingencies in Europe and the Soviet Union, Eat Asia and the Pacific, and the Near East and South Asia. Topics ranged from the possibility of nuclear war to a general discussion of low-intensity conflict. To serve as a starting point for discussion, we asked several of the participants to provide papers representing a wide range of views. The participants agreed that for many years the Soviet/Warsaw Pact threat to Europe shaped U.S. force planning but that the Soviet union no longer posed a conventional threat. Nuclear weapons held by the former Soviet republics and other nations, however, remain a concern. There was no agreement of the methodology for sizing U.S. forces. Some argued for sizing based on specific threats; other argued for flexibility to meet any and all contingencies and cited the Gulf War as a example.

  1. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  2. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  3. National Strategy for Aviation Security

    DTIC Science & Technology

    2007-03-26

    for Aviation Security (hereafter referred to as the Strategy") to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort

  4. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    SciTech Connect

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  5. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... From the Federal Register Online via the Government Publishing Office NATIONAL ARCHIVES AND... Advisory Committee (NISPPAC) AGENCY: National Archives and Records Administration. ACTION: Notice of...: National Archives and Records Administration, 700 Pennsylvania Avenue, NW., Archivist's Reception...

  6. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    SciTech Connect

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  7. 77 FR 6813 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-09

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee..., National Protection and Programs Directorate, Department of Homeland Security, 245 Murray Lane, Mail...

  8. Report: EPA’s National Security Information Program Could Be Improved

    EPA Pesticide Factsheets

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  9. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  10. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  11. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security...

  12. Transition-ready technologies and expertise from the Chemical and Biological National Security Program at LLNL

    SciTech Connect

    Folta, P A; McBride, M T

    2006-02-22

    HSARPA has initiated a new Bioinformatics and Assay Development solicitation, BIAD2 (BAA 06-01), to address a number of technology gaps and requirements for biodetection (www.hsarpabaa.com). This solicitation will leverage the vast research and development capabilities of the private sector and academia in order to meet the needs of HSARPA and Homeland Security. In order to meet these requirements, this solicitation will: (1) Develop and validate actionable assays for the public and private sector; (2) Develop and validate new assays and novel assay methodologies to enhance existing detection systems and enable future detection platforms; (3) Develop next generation assays which are robust against novel, emerging and engineered threats; (4) Develop novel assays that detect low levels of ribonucleic acid (RNA)-based viral threats in complex backgrounds; (5) Develop novel assays to characterize the viability, degree of virulence or toxicity, and countermeasure resistance of a biological agent; and (6) Develop new bioinformatics tools to support assay development and assay validation The Lawrence Livermore National Laboratory (LLNL) Bioassays and Signature Program (BSP) develops nationally-validated detection and identification assays to cover the full range of biological threat agents, starting from human, animal, and plant pathogens on the Select Agent list. The assays that have been co-developed by the CDC and the BSP are used internationally and represent the gold standard for molecular detection of select agent pathogens for the public health community. They are also used in the DHS environmental monitoring operations such as BioWatch and DHS National Security Special Events support. These reagents have been used to process and analyze more than 5 million samples and have delivered exceptional performance for the end users, with zero false positives since their deployment. Currently, highly-multiplexed nucleic acid assays that represent the ''next-generation'' in

  13. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  14. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  15. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  16. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  17. 10 CFR 602.16 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient...

  18. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    SciTech Connect

    1995-11-30

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met.

  19. U.S. Security Assistance Programs in Southern Africa: Are They Supporting National Objectives?

    DTIC Science & Technology

    1985-04-01

    AFRICA: ARE THEY SUPPORTING NATIONAL OBJECTIVES? MAJOR ROBIERT D. GRISWELL 85-0985 "insights into tomorrow" LA- DOMMMONSTATEMEi Appmed Am pua Woo 1D~ utut ~s...name and complete title of the study . This document may be reproduced for use in other research reports or educational pursuits contingent upon the...national ~objocti𔃾es, This study reviews the national objectives, examines U.S. interests in tereiod compares UJS. and U.S.S.R. security assistance

  20. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security...

  1. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Security program. 601.3 Section 601.3 Public... DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of Administrative Services, is responsible for conducting a security program that ensures effective...

  2. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Security program. 601.3 Section 601.3 Public... DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of Administrative Services, is responsible for conducting a security program that ensures effective...

  3. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Security program. 601.3 Section 601.3 Public... DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of Administrative Services, is responsible for conducting a security program that ensures effective...

  4. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Security program. 601.3 Section 601.3 Public... DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of Administrative Services, is responsible for conducting a security program that ensures effective...

  5. 12 CFR 748.0 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Security program. 748.0 Section 748.0 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS SECURITY PROGRAM, REPORT....0 Security program. (a) Each federally insured credit union will develop a written security...

  6. 77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... Doc No: 2012-10510] DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs... Federal Register of April 25, 2012, concerning the President's National Security...

  7. National Nuclear Security Administration Service Center Environmental Programs Long-Term Environmental Stewardship Baseline Handbook

    SciTech Connect

    Griswold, D. D.; Rohde, K.

    2003-02-26

    As environmental restoration (ER) projects move toward completion, the planning, integration, and documentation of long-term environmental stewardship (LTES) activities is increasingly important for ensuring smooth transition to LTES. The Long-Term Environmental Stewardship Baseline Handbook (Handbook) prepared by the National Nuclear Security Administration (NNSA) Service Center Environmental Programs Department (EPD) outlines approaches for integrating site-specific LTES planning and implementation into site ER baseline documentation. Since LTES will vary greatly from site to site, the Handbook also provides for flexibility in addressing LTES in ER Project life-cycle baselines, while clearly identifying Environmental Management (EM) requirements. It provides suggestions for enacting LTES principles and objectives through operational activities described in site-specific LTES plans and life cycle ER Project baseline scope, cost, and schedule documentation and tools for more thorough planning, better quantification, broader understanding of risk and risk management factors, and more comprehensive documentation. LTES planning applied to baselines in a phased approach will facilitate seamlessly integrating LTES into site operational activities, thereby minimizing the use of resources.

  8. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  9. 45 CFR 601.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Security program. 601.3 Section 601.3 Public Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division...

  10. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    SciTech Connect

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  11. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  12. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    SciTech Connect

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  13. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    Hudson, David

    2015-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  14. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran

    PubMed Central

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Background: Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households’ food security. Methods: The study sample included 359 mothers of children aged 6–72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. Results: At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively (P < 0.001), at the end of the study. Odds of having worse food insecurity in households with medium and high wealth index was 65% and 87% lower than those with low wealth index, respectively (odds ratio [OR] = 0.35, 95% confidence interval [CI]: 0.2–0.61, and OR = 0.23, 95% CI: 0.12–0.43). Food sharing was common among more than 95% of the studied households. Mean maternal body mass index (BMI) increased significantly after 6 months (P < 0.001). However, there was no significant association between mother's BMI and household food security in the baseline and at the end of the study (P > 0.05). Conclusions: Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs. PMID:27833722

  15. Nevada National Security Site 2013 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    Hudson, David B.

    2014-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2013 results. Beginning with this report, analysis results for leachate collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included.

  16. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  17. 32 CFR 156.5 - National security positions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false National security positions. 156.5 Section 156.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM (PSP) § 156.5 National security positions. (a) Procedures. The objective of...

  18. 76 FR 10262 - Information Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-24

    ... 46 CFR Part 503 RIN 3072-AC40 Information Security Program AGENCY: Federal Maritime Commission... relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect January 5, 2010, and which prescribes a...

  19. National Security Technology Incubator Operations Plan

    SciTech Connect

    2008-04-30

    This report documents the operations plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The operation plan includes detailed descriptions of the structure and organization, policies and procedures, scope, tactics, and logistics involved in sustainable functioning of the NSTI program. Additionally, the operations plan will provide detailed descriptions of continuous quality assurance measures based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Forms that assist in operations of NSTI have been drafted and can be found as an attachment to the document.

  20. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    reactors p.nd even opened up drilling in the Arctic National Wildlife Refuge ( ANWR ). However, the reality is, "Oil company experts believe ... in at...best 10 years time, ANWR could boost American production by 600,000 barrels a day.ŝ Additionally, it will take decades to build nuclear power plants...naturally make·the altermitive fuels cheaper and thus more attractive. Finally, further domestic drilling in the Arctic National Wildlife Refuge ( ANWR ) and

  1. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  2. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  3. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  4. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  5. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and......

  6. Climate Change and National Security

    DTIC Science & Technology

    2013-02-01

    does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. a. REPORT Climate Change and National...Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Does climate change constitute a national security threat to the United States? What is climate ...resources for an in-depth discussion on national security and climate change . 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES

  7. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  8. 76 FR 72427 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... Security Telecommunications Advisory Committee AGENCY: National Protection and Programs Directorate, DHS... President's National Security Telecommunications Advisory Committee (NSTAC) will meet on Thursday, December...) telecommunications policy. During the meeting, NSTAC members will receive feedback from the Department of...

  9. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  10. National Security Technology Incubator Action Plan

    SciTech Connect

    None, None

    2008-02-28

    This report documents the action plan for developing the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). This action plan serves as a tool in measuring progress in the development process and delivery of services for the NSTI program. Continuous review and evaluation of the action plan is necessary in the development process of the NSTI. The action plan includes detailed steps in developing the NSTI program based on recommended best practices in incubator development by the National Business Incubation Association (NBIA). Included are tasks required to implement the NSTI, developed within a work breakdown structure. In addition, a timeline is identified for each task.

  11. The medical care programs of the Farm Security Administration, 1932 through 1947: a rehearsal for national health insurance?

    PubMed Central

    Grey, M R

    1994-01-01

    At a time of renewed interest in universal health insurance, an examination of earlier periods when society grappled with the link between socioeconomic status and health is fruitful. Between 1935 and 1947, the federal government sponsored a comprehensive medical care program for low-income farmers, sharecroppers, and migrant workers under the auspices of the Farm Security Administration (FSA). Despite the strong opposition of the American Medical Association, humanitarian and economic concerns at the local level often promoted physicians' participation in the program's group prepayment plans. Many FSA leaders clearly saw the program as a model upon which national health insurance might advance. However, in the wake of World War II, the FSA program declined as physicians' income improved, the rural population declined, and traditional ideological objections to federal intervention in medical care resurfaced. The FSA experience illuminates the complex ideological, economic, and humanitarian motivations of American physicians in the face of health care reform. Images p1680-a p1682-a p1684-a PMID:7943497

  12. 76 FR 55693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ... magnetic disc, tape, digital media, and CD-ROM. Retrievability: Much of the data within this system does... media in the interest of the public. A review of this system is being conducted to determine if the... security analysis and reporting; Public source data including commercial databases, media, newspapers,...

  13. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ..., immigration, intelligence, or other homeland security functions. In addition, information may be shared with... commentary from immigration enforcement officers, which includes references to active criminal and other..., intelligence, and other DHS mission-related functions. Data is also used to provide associated...

  14. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security Program Review Committee....

  15. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security Program Review Committee....

  16. 5 CFR 1312.12 - Security Program Review Committee.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.12 Security Program Review Committee. The... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Security Program Review Committee....

  17. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  18. National Security Technology Incubator Business Plan

    SciTech Connect

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  19. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security...

  20. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  1. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  2. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 211.110-2... PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security agency, and...

  3. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 211.110... ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a) A new product which is produced to conform with specifications developed by national security...

  4. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  5. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 204.5-2... PROGRAMS NOISE EMISSION STANDARDS FOR CONSTRUCTION EQUIPMENT General Provisions § 204.5-2 National security... for a national security exemption is required. (c) For purposes of section 11(d) of the Act,...

  6. 75 FR 71171 - Social Security Disability Program Demonstration Project: Benefit Offset National Demonstration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    ... disability or blindness under title XVI of the Act. However, we are only modifying title II program rules for... disability or blindness does not affect the recipient's disability or blindness status under the SSI program... based on disability and title XVI payments based on disability or blindness. We estimate that the...

  7. 75 FR 707 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... National Security Information Memorandum of December 29, 2009--Implementation of the Executive Order ``Classified National Security Information'' Order of December 29, 2009--Original Classification Authority #0... 13526 of December 29, 2009 Classified National Security Information This order prescribes a...

  8. Designing an effective microbial forensics program for law enforcement and national security purposes.

    PubMed

    Murch, Randall S

    2014-06-01

    Forensic capabilities that provide lead information, and investigative, intelligence, prosecution and policy decision support can be invaluable for responding to and resolving bioterrorism events. Attributing biological attacks through scientific and other resources and processes is an important goal, for which science can be instrumental. Some even believe that having effective microbial forensics capabilities along with others can even deter adversaries from using biological weapons. For those nations that do not have such or wish to integrate or upgrade capabilities, thoughtful analysis and consideration of certain design principles will increase the likelihood that success will be attained.

  9. The FBI's Library Awareness Program: National Security vs Government Intrusion into American Libraries [and] The KGB and the Library Target.

    ERIC Educational Resources Information Center

    Information Reports and Bibliographies, 1988

    1988-01-01

    Presents statements made to the House Judiciary Subcommittee on Civil and Constitutional Rights by representatives of the Federal Bureau of Investigation and the library community concerning the surveillance of library users' reading habits as a national security measure. An FBI study on the extent of Soviet intelligence service's utilization of…

  10. Nevada National Security Site 2012 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    NSTec Environmental Management

    2013-02-11

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2012 results. During 2012, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Groundwater samples were collected at UE5PW-1, UE5PW-2, and UE5PW-3 on March 21, August 7, August 21, and September 11, 2012, and static water levels were measured at each of the three pilot wells on March 19, June 6, August 2, and October 15, 2012. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Final results from samples collected in 2012 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  11. Nevada National Security Site 2010 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2010 results. During 2010, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 10 and August 10, 2010; at UE5PW-2 on March 10, August 10, and August 25, 2010; and at UE5PW-3 on March 31, August 10, and August 25, 2010. Static water levels were measured at each of the three pilot wells on March 1, April 26, August 9, and November 9, 2010. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Results from all samples collected in 2010 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  12. Nevada National Security Site 2011 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    SciTech Connect

    NSTec Environmental Management

    2012-02-27

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS). The data have been collected since 1993 and include calendar year 2011 results. During 2011, groundwater samples were collected and static water levels were measured at the three pilot wells surrounding the Area 5 RWMS. Samples were collected at UE5PW-1 on March 8, August 2, August 24, and October 19, 2011; at UE5PW-2 on March 8, August 2, August 23, and October 19, 2011; and at UE5PW-3 on March 8, August 2, August 23, and October 19, 2011. Static water levels were measured at each of the three pilot wells on March 1, June 7, August 1, and October 17, 2011. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. Indicators of general water chemistry (cations and anions) were also measured. Initial total organic carbon and total organic halides results for samples collected in August 2011 were above previous measurements and, in some cases, above the established investigation limits. However, after field sample pumps and tubing were disinfected with Clorox solution, the results returned to normal levels. Final results from samples collected in 2011 were within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. These data indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS. There were no significant changes in measured groundwater parameters compared to previous years. The report contains an updated cumulative chronology for the Area 5 RWMS Groundwater Monitoring Program and a brief description of the site hydrogeology.

  13. Ingenuity and National Security

    DTIC Science & Technology

    2013-06-01

    result of poor joint integration in Operation Eagle Claw (Iranian Hostage Rescue), Operation Urgent Fury (Invasion of Grenada ), combined with the...American forces invaded the Caribbean island nation of Grenada . Operation Urgent Fury began at 0500 on October 25, 1983. Grenada’s Marxist government...Soviet bloc government planting seeds of revolutionary warfare in Central America concerned President Reagan and the leaders of the island nations of the

  14. Saudi National Security. Research report

    SciTech Connect

    Al-Ayed, I.

    1996-05-01

    The purpose of this research paper is to focus on Saudi National Security. The author highlights geographic and historic factors that impact on threats to Saudi Arabia, and the objectives for providing security. He discusses how to achieve these objectives, including military readiness and cooperation with other countries to guarantee Saudi security. This is to ensure interests which are vital to the industrial world as the result of a continued flow of oil with a reasonable price. Given is the author`s opinion about U.S. political strategy in the region to achieve stability in the Gulf Region.

  15. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2011-01-01

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  16. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2010-09-03

    This document establishes the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept low-level radioactive waste and mixed low-level waste for disposal. The NNSSWAC includes requirements for the generator waste certification program, characterization, traceability, waste form, packaging, and transfer. The criteria apply to radioactive waste received at the NNSS Area 3 and Area 5 Radioactive Waste Management Complex for disposal. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project at (702) 295-7063 or fax to (702) 295-1153.

  17. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45... 32 National Defense 6 2012-07-01 2012-07-01 false Information Security Program Review....

  18. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review....

  19. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45... 32 National Defense 6 2014-07-01 2014-07-01 false Information Security Program Review....

  20. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45... 32 National Defense 6 2013-07-01 2013-07-01 false Information Security Program Review....

  1. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Program Review....

  2. National Security Policy: Mexico.

    DTIC Science & Technology

    1986-04-01

    President Lazaro Cardenas expropriated the 2 assets of seventeen foreign oil companies to include major United States companies and formed a national oil...Ironically, it was a military man General Lazaro Cardenas , who as president from 1935 to 1940 eliminated the preeminence of the military in...offices to fill. Other accomplishments of President Cardenas were his stripping power from rival general officers and his successful efforts to

  3. AIDS and National Security

    DTIC Science & Technology

    2007-11-02

    the body loses its ability to fight off other infections like the flu or pneumonia that it could normally handle with ease.11 These infections are... children orphaned by AIDS in sub-Saharan Africa.32 Failing states are not able to provide care for these orphans so they are lured into crime or...four major program elements funded by USAID are primary prevention, caring for children affected by AIDS, home and community based care and treatment

  4. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  5. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  6. 12 CFR 326.3 - Security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and... SECURITY DEVICES AND PROCEDURES AND BANK SECRECY ACT 1 COMPLIANCE Minimum Security Procedures § 326.3 Security program. (a) Contents of security program. The security program shall: (1) Establish...

  7. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  8. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  9. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  10. 14 CFR 1260.31 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false National security. 1260.31 Section 1260.31... Provisions § 1260.31 National security. National Security October 2000 Normally, NASA grants do not involve... who will have access to the information must obtain the appropriate security clearance in advance...

  11. National Security Management Correspondence Course.

    ERIC Educational Resources Information Center

    Industrial Coll. of the Armed Forces (DOD), Washington, DC.

    A course of study on the fundamental aspects of the areas of knowledge which are essential to effective management of national security is presented. The course presents the substance of the Industrial College resident curriculum adapted to the correspondence method of study. The subject matter is designed to impart knowledge and understanding of…

  12. Diversity Intersects with National Security.

    ERIC Educational Resources Information Center

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  13. Climate Change and National Security

    SciTech Connect

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  14. Space and national security

    SciTech Connect

    Stares, P.B.

    1987-01-01

    In this timely volume, the author assesses the long-term costs and benefits of developing ASAT weapons and the feasibility of alternative policies. He examines in detail the military space programs of the United States and Soviet Union and explores the potential military uses of space. He also addresses the threats to space systems and how they can be defended, the impact of ASAT attacks in wartime, and the utility of arms control. The author concludes that current U.S. policy is both shortsighted and unbalanced in stressing ASAT development over meaningful limitations on space weaponry. He presents a list of unilateral and negotiated measures as an alternative strategy for the United States.

  15. 75 FR 52768 - National Protection and Programs Directorate; Agency Information Collection Activities: Office of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... Infrastructure Protection; Chemical Security Awareness Training Program AGENCY: National Protection and Programs... and Programs Directorate. Title: Chemical Security Awareness Training Program (CSATP). OMB...

  16. Abortion: a national security issue.

    PubMed

    Mumford, S D

    1982-04-15

    The national security implications of abortion have not been addressed in a public forum but could come to be the single most important facet of the abortion debate. Abortion has been and will continue to be an essential variable in fertility control. Any serious effort at population growth control in the next few decades will have to recognize the role abortion has in birth rate decline. At this time an estimated 40-50 million abortions are performed worldwide each year; 1/2 of them are illegal. In the absence of abortion, annual growth would approach approximately 120 million. Growth of this magnitude would probably place intolerable strains on the economics and environments of some nations. To recognize the role of abortion in fertility control is to emphasize the inescapable need for abortion as 1 element in any comprehensive family planning service. Excessive population growth leads to chronic unemployment and the frustration of the goals of hundreds of millions of people. While this new threat to the security of individual nations and ultimately to global security has not been widely acknowledged, it is beginning to gain the attention of people of different professions and distinctive political persuasions. In many ways, rampant population growth is an even more dangerous and subtle threat to the world than thermonuclear war, for it is intrinsically less subject to rational safeguards and less amenable to organized control. Possibly the greatest and most pervasive problem is the declining ability to meet human needs in the areas of food, raw material, and resources, counterpoised against what are clearly rising expectations of growing populations. The following facts cannot be disputed: world population is a threat to the security of all nations, including the U.S.; abortion is essential to any effective population growth control effort; abortion is a national security issue; and as the availability of legal abortion in the U.S. goes, so goes the availability

  17. Status of the National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  18. Input from Key Stakeholders in the National Security Technology Incubator

    SciTech Connect

    2008-01-31

    This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

  19. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  20. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    SciTech Connect

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  1. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  2. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for...

  3. 12 CFR 168.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 168.3 Section 168.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  4. 12 CFR 391.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Security program. 391.3 Section 391.3 Banks and... OF THRIFT SUPERVISION REGULATIONS Security Procedures § 391.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures for opening and closing for...

  5. 12 CFR 568.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security program. 568.3 Section 568.3 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.3 Security program. (a) Contents of security program. The security program shall: (1) Establish procedures...

  6. Teaching Secure Programming

    SciTech Connect

    Bishop, Matt; Frincke, Deb A.

    2005-09-01

    This article discusses issues in teaching secure coding in the context of both academic institutions and training organizations. The emphasis is on the importance of assurance. There is also some discussion of the role of checklists.

  7. 75 FR 21011 - National Protection and Programs Directorate; Statewide Communication Interoperability Plan...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... Security, National Protection and Programs Directorate/Cybersecurity and Communications/Office of Emergency... Department of Homeland Security (DHS), National Protection and Programs Directorate/Cybersecurity...

  8. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  9. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS PRODUCT NOISE LABELING General Provisions § 211.110-2 National security exemptions. (a)...

  10. 76 FR 81359 - National Security Personnel System

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... MANAGEMENT 5 CFR Chapter XCIX RIN 3206-AM 53 National Security Personnel System AGENCY: Department of Defense... Defense and Office of Personnel Management regulations concerning the National Security Personnel System... the Department of Defense (DOD) authority to establish a National Security Personnel System (NSPS)...

  11. Next Generation National Security Leaders

    SciTech Connect

    Mahy, Heidi A.; Fankhauser, Jana G.; Stein, Steven L.; Toomey, Christopher

    2012-07-19

    It is generally accepted that the international security community faces an impending challenge in its changing leadership demographics. The workforce that currently addresses nonproliferation, arms control, and verification is moving toward retirement and there is a perceived need for programs to train a new set of experts for both technical- and policy-related functions to replace the retiring generation. Despite the perceived need, there are also indicators that there are not sufficient jobs for individuals we are currently training. If we had “right-sized” the training programs, there would not be a shortage of jobs. The extent and scope of the human resource crisis is unclear, and information about training programs and how they meet existing needs is minimal. This paper seeks to achieve two objectives: 1) Clarify the major human resource problem and potential consequences; and 2) Propose how to characterize the requirement with sufficient granularity to enable key stakeholders to link programs aimed at developing the next generations of experts with employment needs. In order to accomplish both these goals, this paper recommends establishing a forum comprised of key stakeholders of this issue (including universities, public and private sectors), and conducting a study of the human resources and resource needs of the global security community. If there is indeed a human resource crisis in the global security field, we cannot address the problem if we are uninformed. The solution may lie in training more (or fewer) young professions to work in this community – or it may lie in more effectively using our existing resources and training programs.

  12. Chemical and Biological National Security Program (CBNP) Annual Report FY2002 Overview Local Integration of NARAC With Cities (LINC)

    SciTech Connect

    Ermak, D L; Nasstrom, J S; Tull, J E; Baskett, R L; Pobanz, B; Mosley-Rovi, R

    2002-11-18

    The objective of the Local Integration of NARAC With Cities (LINC) project is to demonstrate the capability for providing local government agencies with advanced, CBNP-developed operational atmospheric plume prediction capabilities that can be seamlessly integrated with appropriate federal agency support for homeland security. LINC's approach is to integrate Lawrence Livermore National Laboratory's (LLNL) National Atmospheric Release Advisory Center (NARAC) tools and services with local emergency management and response centers. In the event of an airborne chemical or biological agent release in an urban area, large portions of the city and even the surrounding suburbs may be affected by the airborne plume, depending on the type of agent, size of release, dissemination mechanism and ambient meteorological conditions. The goal of LINC is to provide real-time predictions that would be used by emergency managers and responders (fire, police, hazmat, etc.) to map the extent and effects of hazardous airborne material. Prompt predictions are provided to guide first responders in determining protective actions to be taken (use of personal protective equipment, evacuation, sheltering in place, etc.), safe locations for incident command posts, and critical facilities that may be at risk (hospitals, schools, etc.). LINC also provides response teams from multiple jurisdictions (local, state, and federal) with tools to effectively share information regarding the areas and populations at risk. The ultimate goal of LINC is a seamless and coordinated nationwide system that integrates NARAC prediction and situation awareness resources with the appropriate local, state and federal agencies for homeland security applications ranging from planning to emergency response to consequence assessment and attribution.

  13. Cooperative global security programs modeling & simulation.

    SciTech Connect

    Briand, Daniel

    2010-05-01

    The national laboratories global security programs implement sustainable technical solutions for cooperative nonproliferation, arms control, and physical security systems worldwide. To help in the development and execution of these programs, a wide range of analytical tools are used to model, for example, synthetic tactical environments for assessing infrastructure protection initiatives and tactics, systematic approaches for prioritizing nuclear and biological threat reduction opportunities worldwide, and nuclear fuel cycle enrichment and spent fuel management for nuclear power countries. This presentation will describe how these models are used in analyses to support the Obama Administration's agenda and bilateral/multinational treaties, and ultimately, to reduce weapons of mass destruction and terrorism threats through international technical cooperation.

  14. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-12-05

    The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized

  15. The Risks that Foreign Labor Poses to UAE National Security

    DTIC Science & Technology

    2012-06-08

    AND SUBTITLE The Risks that Foreign Labor poses to UAE National Security 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6......69 viii APPENDIX C INTERNATIONAL CONVENTION FOR THE PROTECTION OF MIGRANT WORKERS’ RIGHTS

  16. [Evaluation of food security and anti-hunger public policies in Brazil, 1995-2002: 4--National School Nutrition Program].

    PubMed

    Santos, Leonor Maria Pacheco; Santos, Sandra Maria Chaves dos; Santana, Luciana Alaíde Alves; Henrique, Flavia Conceição Santos; Mazza, Roseanne Porto Dantas; Santos, Ligia Amparo da Silva; Santos, Lílian Silva dos

    2007-11-01

    This study evaluated the Brazilian National School Nutrition Program from a structure-process-results perspective. The methodology involved document research and a case study in 45 counties and 73 schools in the State of Bahia, including program manager interviews and household questionnaires involving 3,367 children (7-14 years of age). Relating to program structure, the study analyzed the evolution of normative instruments and some infrastructure aspects. Managers reported problems with the installations for preparing and distributing meals in 28% of the counties. Decentralization to the county (municipal) level was present in 93% of cases and to the school level in about 20%; however, nearly 70% of the schools received the food supplies directly. Although Social Control Councils were created, members were not always chosen democratically. Acceptability of the meals was good, as expected considering the widespread poverty in the target population. Overall program coverage was high (95%), but 77% of schoolchildren in the interior and 39% in the capital city did not receive meals every day. So far, irregular school meal distribution has frustrated the program's aspirations to become a universal social policy and ensure a basic right for children.

  17. 77 FR 65393 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... national security and emergency preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC...

  18. 78 FR 63232 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC... related to national security and emergency preparedness (NS/EP) telecommunications policy. During...

  19. User Interface Program for secure electronic tags

    SciTech Connect

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US.

  20. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-05-22

    SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting

  1. Welcome to Los Alamos National Laboratory: A premier national security science laboratory

    SciTech Connect

    Wallace, Terry

    2012-06-25

    Dr Wallace presents visitors with an overview of LANL's national security science mission: stockpile stewardship, protecting against the nuclear threat, and energy security & emerging threats, which are underpinned by excellence in science/technology/engineering capabilities. He shows visitors a general Lab overview of budget, staff, and facilities before providing a more in-depth look at recent Global Security accomplishments and current programs.

  2. 76 FR 70366 - Ammonium Nitrate Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... SECURITY Office of the Secretary 6 CFR Part 31 RIN 1601-AA52 Ammonium Nitrate Security Program AGENCY... ``Ammonium Nitrate Security Program,'' which was published in the Federal Register on August 3, 2011. The... 62311). Under the proposed Ammonium Nitrate Security Program, the DHS will regulate the sale...

  3. Nevada National Security Site Environmental Report 2011

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  4. Bioethics and the national security state.

    PubMed

    Moreno, Jonathan D

    2004-01-01

    In previous work, I have described the history and ethics of human experiments for national security purposes during he cold war and developed the bioethical issues that will be apparent in the "war on terror". This paper is an attempt to bring these two previous lines of work together under the rubric of the "national security state," a concept familiar to Cold War historians and political scientists. The founding of the national security state was associated with the first articulations of informed consent requirements by national security agencies. My analysis indicates that strengthened consent standards, though conventionally thought to be antithetical crisis, can be seen as an attempt by the postwar national security state to protect itself from critics of expanded governmental power. During the coming years the renewed mission of the national security state in the war on terror should impel students of bioethics to consider its implications for the field.

  5. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    None, None

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  6. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  7. Custodians/Security Program Evaluation.

    ERIC Educational Resources Information Center

    Ennis, Bob

    The Custodians/Security Department is a support service of the Des Moines (Iowa) Independent Community School District. Responsibilities of the department do not stop with the care of the facility, but extend to providing a clean, safe environment for all who use school facilities. Program evaluation in the 1993-94 school year reveals a total…

  8. 75 FR 16159 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-31

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will hold its annual... Management Branch, Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615....

  9. 78 FR 29145 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Advisory Committee Meeting; Correction. SUMMARY: The Department of Homeland Security published a document...'s National Security Telecommunications Advisory Committee (NSTAC). The document contained...

  10. 75 FR 3913 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-25

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee...: The President's National Security Telecommunications Advisory Committee (NSTAC) will be meeting by... Communications System (Government Industry Planning and Management Branch), Department of Homeland Security,...

  11. 75 FR 29781 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-27

    ... SECURITY National Communications System President's National Security Telecommunications Advisory Committee... meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC) will be...), Department of Homeland Security, 245 Murray Lane, SW., Washington, DC 20598-0615; Fax:...

  12. 75 FR 41213 - National Protection and Programs Directorate; Infrastructure Protection Data Call Survey; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-15

    ... SECURITY National Protection and Programs Directorate; Infrastructure Protection Data Call Survey; Correction AGENCY: National Protection and Programs Directorate, DHS. ACTION: Notice; correction. SUMMARY: On December 22, 2009, the Department of Homeland Security (DHS), National Protection and Programs...

  13. External Service Providers to the National Security Technology Incubator

    SciTech Connect

    2008-02-28

    This report documents the identification and assessment of external service providers to the National Security Technology Incubator (NSTI) program for southern New Mexico. The NSTI is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant to Arrowhead Center, New Mexico State University. This report contains 1) a summary of the services to be provided by NSTI; 2) organizational descriptions of external service providers; and 3) a comparison of NSTI services and services offered by external providers.

  14. Extreme Scale Computing to Secure the Nation

    SciTech Connect

    Brown, D L; McGraw, J R; Johnson, J R; Frincke, D

    2009-11-10

    Since the dawn of modern electronic computing in the mid 1940's, U.S. national security programs have been dominant users of every new generation of high-performance computer. Indeed, the first general-purpose electronic computer, ENIAC (the Electronic Numerical Integrator and Computer), was used to calculate the expected explosive yield of early thermonuclear weapons designs. Even the U. S. numerical weather prediction program, another early application for high-performance computing, was initially funded jointly by sponsors that included the U.S. Air Force and Navy, agencies interested in accurate weather predictions to support U.S. military operations. For the decades of the cold war, national security requirements continued to drive the development of high performance computing (HPC), including advancement of the computing hardware and development of sophisticated simulation codes to support weapons and military aircraft design, numerical weather prediction as well as data-intensive applications such as cryptography and cybersecurity U.S. national security concerns continue to drive the development of high-performance computers and software in the U.S. and in fact, events following the end of the cold war have driven an increase in the growth rate of computer performance at the high-end of the market. This mainly derives from our nation's observance of a moratorium on underground nuclear testing beginning in 1992, followed by our voluntary adherence to the Comprehensive Test Ban Treaty (CTBT) beginning in 1995. The CTBT prohibits further underground nuclear tests, which in the past had been a key component of the nation's science-based program for assuring the reliability, performance and safety of U.S. nuclear weapons. In response to this change, the U.S. Department of Energy (DOE) initiated the Science-Based Stockpile Stewardship (SBSS) program in response to the Fiscal Year 1994 National Defense Authorization Act, which requires, 'in the absence of nuclear

  15. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... the Privacy Act because of criminal, civil, and administrative enforcement requirements. This newly... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... criminal, civil, and administrative enforcement requirements. This newly established system of records...

  16. National Security Science and Technology Strategy

    DTIC Science & Technology

    1995-01-01

    Infectious Disease Threats (1994); Committee on National Security—Strategic Implementation Plan (March 1995), and Committee on International Science...country’s first comprehensive Presidential statement of national security science and technology priorities . It augments the President’s National Security...this theme is a priority on engagement with other nations . Rather than isolate a state as we did the Soviet Union, we now seek to integrate states

  17. Economic Sanctions Targeting Yugoslavia - An Effective National Security Strategy Component

    DTIC Science & Technology

    2006-05-31

    USAWC STRATEGY RESEARCH PROJECT Economic Sanctions Targeting Yugoslavia – An Effective National Security Strategy Component by COL Charles J. Kacsur...Jr. U.S. Army Dr. Clayton K. S. Chun Project Advisor The views expressed in this academic research paper are those of the author and do not...National Security Strategy Component 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Charles Kacsur; 5d. PROJECT

  18. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  19. Y-12 National Security Complex Water Assessment

    SciTech Connect

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  20. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  1. Marketing Plan for the National Security Technology Incubator

    SciTech Connect

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  2. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  3. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 26 2013-07-01 2013-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  4. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 25 2014-07-01 2014-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  5. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 26 2012-07-01 2011-07-01 true National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  6. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National...

  7. National School Lunch Program

    ERIC Educational Resources Information Center

    US Department of Agriculture, 2009

    2009-01-01

    The National School Lunch Program is a federally assisted meal program operating in over 101,000 public and non-profit private schools and residential child care institutions. It provides nutritionally balanced, low-cost or free lunches to more than 30.5 million children each school day in 2008. In 1998, Congress expanded the National School Lunch…

  8. Nevada National Security Site Environmental Report 2012

    SciTech Connect

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  9. Overview of Scientific Freedom and National Security

    NASA Astrophysics Data System (ADS)

    Lerch, Irving

    2000-04-01

    The subject of our scrutiny is very much in the news, punctuated with nouns and modifiers both inflammatory and mundane such as espionage, justice, scientific accountability and scientific freedom. And while our discussion will focus on these issues, I want to raise some of the pragmatic questions that bear on the foundation of our support for international science. Beneath questions of guilt and the loss of secrets in the Wen Ho Lee case lay the inherent tension between the tradition of open exchange in the scientific enterprise and the need to protect the nation's security. How this balance is to be achieved in a democratic society has bedeviled us ever since the Manhattan project heralded the emergence of science and technology as instruments of great national power. If we do not find this balance, we run the risk of damaging some of the most important intellectual treasures that the US has produced the Department of Energy's national laboratories and the entire system that we call the international scientific enterprise. For while the superheated charges of lax security and criminal negligence have led some to call for ``firewalls" to isolate and protect the secrets in our weapons labs, such measures may have severe consequences for weapons and non-weapons labs alike and their many associated universities. It's estimated that from 70% to as much as 80% in the expansion of our economy is technology-driven, derived from the most productive system of scientific innovation in the world. This is also true of our national security. Science is indispensable to the development and maintenance of the nation's arsenals. The Department of Energy's Nuclear Stockpile Stewardship Program is central to the safety and reliability of American nuclear weapons and to our hope for a worldwide ban on nuclear tests. But this program will fail without a continuing intense development effort based on cutting-edge science. And a great deal of the science needed is being pursued in

  10. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  11. National security in the third world

    SciTech Connect

    Al-Mashat, A.M.M.

    1985-01-01

    For nations of the Third World, national security poses serious dilemmas. Unlike Western nations, less-developed countries must balance the complex and often contradictory requirements of socio-economic and political development with problems of internal stability and the requirements of national defense. For these countries, a concept of national security that focuses primarily on the international threat system and its overt manifestations of wars and violence, ignoring domestic well-being, is inadequate on theoretical and pragmatic grounds. This book addresses the security problems of Third World states, arguing for new ways to define and measure national security so that the concept may be appropriately applied to the needs of developing countries. In addition, the author argues that the tranquility of a state, a concept traditionally linked with national security, cannot necessarily be associated with quality of life as measured by conventional means. Dr. Al-Mashat constructs a tranquility index for 95 developing nations and tests its relationship with the physical quality-of-life index to demonstrate this point. Attempts to improve quality of life, he suggests, may in many countries lead to a reduction in security unless simultaneous attempts are made to democratize the regime.

  12. Personnel Security Program. Change 2

    DTIC Science & Technology

    1993-07-14

    administrative action in a personnel security determination. # First Amendment (Ch 2, 7/14/93) 1-3 Jan 87# DoD 5200.2-R 1-312 National Agency Check (NAC) A... First Amendment (Ch 2, 7/14/93) 1-4 Jan 87# DoD 5200.2-R (1) The nature and seriousness of the conduct: (2) The circumstances surrounding the conduct...Acce-ioii For NTiS r(PA&J LI D ’••.:t . ,. ~ F .r...... An. .... # First Amendment (Ch 2, 7/14/93) VI-3 Jan 87# DoD5200.2-R 0 CHAPTER VII ISSUING

  13. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-10-14

    CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the

  14. 76 FR 40296 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-08

    ... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security Information... would update NARA's regulations related to declassification of classified national security information... of Executive Order 13526, Classified National Security Information, and its Implementing...

  15. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... RECORDS ADMINISTRATION 36 CFR Part 1260 RIN 3095-AB64 Declassification of National Security Information... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security...

  16. 78 FR 45255 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... preparedness (NS/EP) telecommunications policy. Agenda: The NSTAC members will deliberate and vote on the...

  17. 77 FR 75182 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-19

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will receive an update on progress made to date by the...

  18. 76 FR 52672 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-23

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. During the conference call, the NSTAC members will receive an update regarding...

  19. 78 FR 8160 - President's National Security Telecommunications Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-05

    ... SECURITY President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Teleconference. SUMMARY: The President's National Security Telecommunications Advisory Committee... telecommunications policy. Agenda: The NSTAC members will review and discuss the draft NSTAC Report to the...

  20. National Security Agency Accountability Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices...

  2. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices...

  3. 12 CFR 21.3 - Security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Security program. 21.3 Section 21.3 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY MINIMUM SECURITY DEVICES AND PROCEDURES, REPORTS OF SUSPICIOUS ACTIVITIES, AND BANK SECRECY ACT COMPLIANCE PROGRAM Minimum Security Devices...

  4. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  5. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  6. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  7. 31 CFR 500.325 - National securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 500.325... Definitions § 500.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  8. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  9. 31 CFR 515.325 - National securities exchange.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false National securities exchange. 515.325... Definitions § 515.325 National securities exchange. The term national securities exchange shall mean an exchange registered as a national securities exchange under section 6 of the Securities Exchange Act...

  10. Space Shuttle security policies and programs

    NASA Technical Reports Server (NTRS)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  11. Space Shuttle security policies and programs

    NASA Astrophysics Data System (ADS)

    Keith, E. L.

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  12. Nevada National Security Site Radiological Control Manual

    SciTech Connect

    Radiological Control Managers’ Council

    2012-03-26

    This document supersedes DOE/NV/25946--801, 'Nevada Test Site Radiological Control Manual,' Revision 1 issued in February 2010. Brief Description of Revision: A complete revision to reflect a recent change in name for the NTS; changes in name for some tenant organizations; and to update references to current DOE policies, orders, and guidance documents. Article 237.2 was deleted. Appendix 3B was updated. Article 411.2 was modified. Article 422 was re-written to reflect the wording of DOE O 458.1. Article 431.6.d was modified. The glossary was updated. This manual contains the radiological control requirements to be used for all radiological activities conducted by programs under the purview of the U.S. Department of Energy (DOE) and the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). Compliance with these requirements will ensure compliance with Title 10 Code of Federal Regulations (CFR) Part 835, 'Occupational Radiation Protection.' Programs covered by this manual are located at the Nevada National Security Site (NNSS); Nellis Air Force Base and North Las Vegas, Nevada; Santa Barbara and Livermore, California; and Andrews Air Force Base, Maryland. In addition, fieldwork by NNSA/NSO at other locations is covered by this manual. Current activities at NNSS include operating low-level radioactive and mixed waste disposal facilities for United States defense-generated waste, assembly and execution of subcritical experiments, assembly/disassembly of special experiments, the storage and use of special nuclear materials, performing criticality experiments, emergency responder training, surface cleanup and site characterization of contaminated land areas, environmental activity by the University system, and nonnuclear test operations, such as controlled spills of hazardous materials at the Hazardous Materials Spill Center. Currently, the major potential for occupational radiation exposure is associated with the burial of

  13. Financial status of the Social Security Program.

    PubMed

    Myers, R J

    1983-03-01

    This study, originally a background paper for the National Commission on Social Security Reform and published as Appendix J in the Commission's Report, outlines the dimensions of the financing problem the Commission addressed. Prepared by Robert J. Myers, the Commission's Executive Director and a former Deputy Commissioner and Chief Actuary of the Social Security Administration, it discusses, in turn, the operational and funding procedures of the Social Security Trust Funds, the measures developed to determine the financial soundness of the program, and the financial status of each trust fund in the past, at present, and projected for the future. The author shows how program funding was gradually shifted from a modified-reserve to a pay-as-you-go basis and how the balance between income and outgo was disrupted by adverse economic conditions during 1979-81, when prices rose more rapidly than wages and unemployment was substantially higher than anticipated. Using several different economic assumptions, Myers estimates how extensive the deficits of the program could be over the short run (the remainder of the 1980's) and over the long term (the period 1982-2055).

  14. The C-27J Spartan Procurement Program: A Case Study in USAF Sourcing Practices for National Security

    DTIC Science & Technology

    2012-06-15

    Furthermore, I would like to thank the members of the Advanced Study of Air Mobility ( ASAM ) Class of 2012, the Dirty Dozen, for their support and assistance...the ASAM program. Mona E. Alexander Table of Contents Page Abstract...Engineering, USAF Academy CO, 1998 PROFESSIONAL HISTORY: 2011 - Present IDE Student, ASAM ; USAF Expeditionary Center, JB McGuire-Dix- Lakehurst NJ 2010

  15. Independent Assessment of the Afghan National Security Forces

    DTIC Science & Technology

    2014-02-01

    on-scene commander, the legal authority to quickly redirect resources within the central fund from one program element to another based on real-time... based analyses are hallmarks of our regional work. This report contains the best opinion of CNA at the time of issue. It does not necessarily...national security forces stand in formation after the flag-raising ceremo- ny that established Security Base Najil in the Alishang Valley of Laghman

  16. National Vaccine Program Office

    MedlinePlus

    ... Track Your Community Vaccine Safety Scientific Agenda Newsletter Sign Up Subscribe to newsletter updates for the latest information ... National Vaccine Program Office. Email Connect With NVPO Sign Up for NVPO Updates To sign up for updates ...

  17. A Call for National Security System Transformation

    DTIC Science & Technology

    2012-06-01

    This interagency program is an integrated counter proliferation, counterterrorism, and illegal trafficking effort to help secure the Caspian Basin ...location of political and international leadership in Kabul shackled the integration of interagency efforts. This was eventually rectified with the

  18. It's No Secret: Fifty-eight Years of National Security Programs at BNL (463rd Brookhaven Lecture)

    SciTech Connect

    Indusi, Joseph

    2010-11-17

    Prepare for a true tale of suspense and international intrigue. A tale that began in 1952, continued through the Cold War, and is not yet complete today. A tale of unexpected allies. Hear the true tale of one Laboratory’s efforts to keep nuclear materials out of the hands of evildoers. Freidlander. Higinbotham. Dodson. Kouts. And many more! See some of BNL’s all-star cast in the defining roles that shaped their careers as they worked toward keeping the nation and the world safe from the proliferation of nuclear weapons.

  19. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the...

  20. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the...

  1. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the...

  2. National Security Technology Incubation Project Continuation Plan

    SciTech Connect

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  3. FEDERAL SPENDING FOR NATIONAL SECURITY,

    DTIC Science & Technology

    ECONOMICS, UNITED STATES), (* DEFENSE SYSTEMS, COSTS), (*NATIONAL DEFENSE , COSTS), UNITED STATES GOVERNMENT, GOVERNMENT PROCUREMENT, ARMS CONTROL, DISARMAMENT, NUCLEAR WEAPONS, MILITARY BUDGETS, DEPARTMENT OF DEFENSE

  4. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1975-10-06

    Results of the passenger screening procedures continue to reflect the success and effec- tiveness of airline and airport security programs. During the...airline and airport security programs. While it is impossible to estimate accurately just how many hijackings and related crimes were prevented, the...attempts might have occurred during 1974 and as many as 25 during the first 6 months of 1975, if current airline and airport security programs had not

  5. How Nation-States Craft National Security Strategy Documents

    DTIC Science & Technology

    2012-10-01

    Africa, Sir David Omand in the United Kingdom, and in the United States, former National Security Advisor Steve Hadley provided time that he did not have...officials, Major General John Cantwell and Ms. Maria Fernandez, individually responsible for force structure, information technol- ogy, and human...about the need for an NSS.179 Speaking at the annual DEMOS security lec- ture in December 2006, Sir David Omand, former UK Security and Intelligence

  6. The Clinton National Security Strategy

    DTIC Science & Technology

    1998-01-01

    second, promoting prosperity, outlrnes enhancing competltlveness through deficit reduction, gaining access to foreign markets , fostering free trade...murky Does domestic investment outweigh free trade? Will North American prosper@ count more than Asian advances? Are any markets more important than...Integration of emerging nations into free market systems to reslstrng genital mutilation find a home as national Interests Again, the order of

  7. It's a national security policy, stupid

    SciTech Connect

    Isaacs, J.

    1993-09-01

    This article discusses the first few national security decisions of the Clinton administration. The first decision was to have the United States continue to honor the nuclear testing moratorium through September, 1994 (or until another nation tested first). The second decision of the Clinton administration was the independence of the Arms Control and Disarmament Agency (ACDA) from the State Department. The third decision was to formally denounce the Reagan Administration's interpretation of the US/Soviet Anti-Ballistic Missile Treaty. The issue of the financing of United States involvement in Somalia was also addressed. The implications of these policy decisions as related to national security are evaluated in this article.

  8. Y-12 Groundwater Protection Program Monitoring Optimization Plan For Groundwater Monitoring Wells At The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    none,

    2013-09-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The plan describes the technical approach that is implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well. Under this approach, wells granted "active" status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling, whereas wells granted "inactive" status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP. Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans. This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes.

  9. National Digital Orthophoto Program

    USGS Publications Warehouse

    ,; ,; ,; ,; ,

    1996-01-01

    A critical component of the National Spatial Data Infrastructure (NSDI) is Framework. Framework provides a base on which to collect, register, and integrate geospatial information accurately and consistently. The Federal Geographic Data Committee (FGDC) proposed that Framework include geodetic control, orthoimagery, elevation, transportation, hydrography, governmental units, and cadastral data. The Mapping Science Committee of the National Research Council recommends that geodetic control, orthoimagery, and elevation data become the critical foundation of the NSDI. The National Digital Orthophoto Program (NDOP) is a working model on how Federal, State, and local government, as well as private industry, can participate to develop the orthoimagery Framework for the Nation.

  10. 77 FR 26024 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ...: 2012-10668] DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0975] National Maritime Security... notice announcing a National Maritime Security Advisory Committee (NMSAC) partially closed public meeting... Guard to continue deliberations and make forward progress regarding multiple maritime...

  11. 76 FR 62311 - Ammonium Nitrate Security Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-07

    ...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 31 RIN 1601-AA52 Ammonium Nitrate Security...), entitled ``Ammonium Nitrate Security Program,'' which was published in the Federal Register on August 3... of ammonium nitrate pursuant to section 563 of the Fiscal Year 2008 Department of Homeland...

  12. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  13. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  14. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  15. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  16. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... members of national securities exchanges. 270.17f-1 Section 270.17f-1 Commodity and Securities Exchanges....17f-1 Custody of securities with members of national securities exchanges. (a) No registered... custody of a company which is a member of a national securities exchange as defined in the...

  17. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  18. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  19. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  20. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  1. 17 CFR 240.17a-6 - Right of national securities exchange, national securities association, registered clearing...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Right of national securities exchange, national securities association, registered clearing agency or the Municipal Securities... and Reports of Certain Stabilizing Activities § 240.17a-6 Right of national securities...

  2. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-04-05

    diversions. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes prevented...airports. Consideration is being given to include a provision in the airport security regulation which would prohibit the introduction of...Security Program. A complete revision of the regulation that established basic airport security requirements is currently underway. One of the more

  3. [National health security agencies: facts and perspectives].

    PubMed

    Houssin, Didier

    2013-10-01

    Despite major changes in its composition over the past two decades, the French health security infrastructure, currently consisting of eight agencies, has endured. This infrastructure has reinforced the French state's capacity to protect the health of its population, but it did not yet provide total protection. The future of national health agencies will depend on their ability to maintain the priority given to public health security ; to preserve credible, high-level scientific expertise ; to meet the challenges of healthcare safety ; and to organize health security at the European level.

  4. Maritime Commerce Security Plan for The National Strategy for Maritime Security

    DTIC Science & Technology

    2005-10-01

    MARITIME COMMERCE SECURITY PLAN FOR THE NATIONAL STRATEGY FOR MARITIME SECURITY OCTOBER 2005 Report Documentation Page Form...COVERED 00-00-2005 to 00-00-2005 4. TITLE AND SUBTITLE Maritime Commerce Security Plan for The National Strategy for Maritime Security 5a... Commerce Security Plan i FOREWORD By signing National Security Presidential Directive 41/Homeland Security Presidential Directive 13 (NSPD-41/HSPD

  5. Nevada National Security Site Environmental Report 2013

    SciTech Connect

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  6. Nuclear Security Education Program at the Pennsylvania State University

    SciTech Connect

    Uenlue, Kenan; Jovanovic, Igor

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor

  7. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1976-09-20

    commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air

  8. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  9. 75 FR 5608 - National Protection and Programs Directorate; Communications Unit Leader (COML) Prerequisite and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate; Communications Unit Leader (COML) Prerequisite and Evaluation AGENCY: National Protection and Programs Directorate, Department of Homeland Security. ACTION:...

  10. S & T for National Security

    DTIC Science & Technology

    2009-05-01

    basic-science surprises, and informed observers of neuroscience believe that remarkable developments will occur in that field during the next few...programs in the three military departments and all of the defense agencies, including DNA, ARPA, and NSA . Additional de jure responsibilities included

  11. Argentina: Nationality, Demography and Security

    DTIC Science & Technology

    1993-04-22

    consciousness. This is where Argentina’s weakness lies, a weakness at the foundation of any political, economic or social plan with which we try to solve our...retained their idiom and customs unusually long; not effectively socialized as Argentines; lack of national identity. The present situation. Our...work force. They lack social coverage and earn minimum wages under the table. Some Paraguayans become "contractors", the peak of the immigrant’s

  12. Technology Convergence and National Security

    DTIC Science & Technology

    2010-08-25

    transdisciplinary nature of that convergence that was critical. Sandro Botticelli Michelangelo Buonarroti Lorenzo the Magnificent Andrea del Verrocchio Leonardo ...da  Vinci   UNCLASSIFIED BACKGROUND LOGIC • Many traditional R&D programs have been commodity or  capability driven, and based on a perceived threat

  13. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  14. 78 FR 16699 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: Coast Guard, DHS. ACTION: Notice of Federal Advisory Committee Meeting. SUMMARY: The National Maritime Security Advisory... national maritime security. This meeting will be open to the public. DATES: The Committee will meet...

  15. National Security Strategy: What About the Environment

    DTIC Science & Technology

    2006-02-27

    and South Korea, to seabed mining and drilling rights in countries surrounding the Caspian Sea. According to Ambassador Jan Kubis , Secretary General of...national economy, distribute wealth, and provide basic goods and services. Kubis notes, “Such environmental pressures 8 could make social polarization...the U.S. interest (Washington, D.C.: Jewish Institute for National Security Affairs, 2001), x. 21 7 Ibid. 8 Jan Kubis , “Initiative For Change,” Our

  16. Nevada National Security Site Environmental Report 2010

    SciTech Connect

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  17. Sensor Science for National Security

    SciTech Connect

    Hardy, Jim E; Warmack, Robert J Bruce; Lavrik, Nickolay V; Datskos, Panos G; BRITTONJr., CHARLES L.

    2009-01-01

    Oak Ridge National Laboratory (ORNL) has over 200 professionals engaged in measurement science research and development. This work includes transduction techniques, advanced microelectronics, signal and image processing, modeling and simulation, material synthesis and characterization, and system engineering issues for packaging, miniaturization, integration, and communications (e.g. wireless networks). ORNL is applying this expertise to detecting, preventing, and reversing the proliferation of weapons of mass destruction, deploying integrated systems for incident awareness, detection, and response, providing technology for detection of explosives, and delivering enhanced protection and new capabilities to first responders and warfighters. Sensor systems include micro- and nano-arrays, optical, chemical, and biological technologies. Electronics research has focused on low-power, low-cost, and wireless functionality. Signal processing advancements encompass data flow with conversion to information and knowledge for intelligent decision making.

  18. Teaching Ethics and National Security Policy.

    ERIC Educational Resources Information Center

    Harbour, Frances V.

    1987-01-01

    Covers the objectives, subject matter, and requirements of a one-semester course based on ethics and national security policy taught within the School of Public Affairs at the University of Maryland at College Park. The course is designed to give students an opportunity to develop skill in the analysis of moral and ethical issues. (JDH)

  19. New rules revamp national security prosecutions

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  20. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE...). However, if in the opinion of the recipient or DOE such involvement becomes expected prior to the...

  1. The National Security Council: An Organizational Assessment

    DTIC Science & Technology

    2008-04-21

    Mifflin, 1991), p. 58. 39 See National Security Adviser: Role and Accountability. 40 Brzezinski acknowledges but discounts the reports that Mondale had...who had worked for Vice President Walter Mondale , who had been given a major policy role.40 The Reagan NSC, 1981-1989 Campaigning for the presidency

  2. The National Security Council: An Organizational Assessment

    DTIC Science & Technology

    2009-02-06

    staff.39 There were also reports of infighting between Carter loyalists on the NSC staff and those who had worked for Vice President Walter Mondale ...Mifflin, 1991), p. 58. 39 See National Security Adviser: Role and Accountability. 40 Brzezinski acknowledges but discounts the reports that Mondale

  3. US and Brazil: Prospective National Security Partners

    DTIC Science & Technology

    2001-01-01

    Chapter 5, “National Security,” data as of April 1997. Maxwell, Kenneth. “George W., King Canute , and Brazil,” Article published by Council on Foreign...22. [22] Kenneth Maxwell, “George W., King Canute , and Brazil,” article published by Council on Foreign Relations, 15 Dec 2000. (Hereafter referred

  4. Water security - Nation state and international security implications

    USGS Publications Warehouse

    Tindall, James A.; Andrew A. Campbell,

    2009-01-01

    A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.

  5. Alternate Energy for National Security.

    NASA Astrophysics Data System (ADS)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  6. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  7. National Nuclear Forensics Expertise Development Program

    NASA Astrophysics Data System (ADS)

    Kentis, Samantha E.; Ulicny, William D.

    2009-08-01

    Over the course of the 2009 Federal Fiscal Year the United States (U.S.) Department of Homeland Security (DHS), in partnership with the Departments of Defense (DoD) and Energy (DOE), is continuing existing programs and introducing new programs designed to maintain a highly qualified, enduring workforce capable of performing the technical nuclear forensics mission. These student and university programs are designed to recruit the best and brightest students, develop university faculty and research capabilities, and engage the national laboratories in fields of study with application in nuclear forensics. This comprehensive effort constitutes the National Nuclear Forensics Expertise Development Program.

  8. National Information Systems Security (INFOSEC) Glossary

    DTIC Science & Technology

    2000-09-01

    Systems Security Engineering ISSM Information Systems Security Manager ISSO Information Systems Security Officer IT Information Technology ITAR ...Digital Net Radio Interface Unit SDNS Secure Data Network System SDR System Design Review SFA Security Fault Analysis SHA Secure Hash Algorithm

  9. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 19 2014-07-01 2014-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  10. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  11. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 18 2011-07-01 2011-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  12. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  13. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  14. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  15. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 19 2012-07-01 2012-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  16. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 19 2013-07-01 2013-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense....

  17. 40 CFR 1042.635 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false National security exemption. 1042.635... Compliance Provisions § 1042.635 National security exemption. The standards and requirements of this part and... government responsible for national defense. (b) Manufacturers may request a national security exemption...

  18. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-04-15

    on item were processed through the screening system daily. The airline and airport security measures developed continue to provide increased safety...United States or Puerto Rico. None of these 16 hijackings resulted from insufficient airport security measures or a breakdown in the FAA-approved airport ... airport security programs is conducted at the Transportation Safety Institute in Oklahoma City, Oklahoma. The course provides in-depth coverage of civil

  19. The Eisenhower Mathematics and Science Education Program: An Enabling Resource for Reform. Summary Report. National Study of the Education for Economic Security Act (EESA) Title II Program.

    ERIC Educational Resources Information Center

    Knapp, Michael S.; And Others

    During the past decade, the federal government, alongside the efforts of state, local, and private-sector groups, has promoted initiatives in the search for ways to improve the teaching of mathematics and science in the nation's schools. This report summarizes a 2-year study of the largest of such federal initiatives, the Dwight D. Eisenhower…

  20. Nevada National Security Site Environmental Report 2011 Summary

    SciTech Connect

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  1. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  2. 76 FR 2700 - National Protection and Programs Directorate; National Emergency Communications Plan (NECP) Goal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-14

    ... points of contact (police, fire, emergency medical services, emergency managers, dispatchers, radio... SECURITY National Protection and Programs Directorate; National Emergency Communications Plan (NECP) Goal 2... Communications (CS&C)/Office of Emergency Communications (OEC) will submit the following Information...

  3. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    ERIC Educational Resources Information Center

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  4. 17 CFR 140.20 - Designation of senior official to oversee Commission use of national security information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... to oversee Commission use of national security information. 140.20 Section 140.20 Commodity and... national security information. (a) The Executive Director is hereby designated to oversee the Commission's program to ensure the safeguarding of national security information received by the Commission from...

  5. Y-12 Groundwater Protection Program Monitoring Optimization Plan For Groundwater Monitoring Wells At The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    Elvado Environmental LLC

    2009-12-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and groundwater quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted 'active' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted 'inactive' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on

  6. 77 FR 1710 - National Maritime Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-11

    ... SECURITY Coast Guard National Maritime Security Advisory Committee AGENCY: Coast Guard, DHS. ACTION... published in the Federal Register of January 9, 2012, a notice announcing a National Maritime Security... regarding multiple maritime security initiatives. If you have been adversely affected by the delay...

  7. Nuclear Arms and National Security. 1983 National Issues Forum.

    ERIC Educational Resources Information Center

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  8. National Center for Nuclear Security - NCNS

    SciTech Connect

    2014-11-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  9. National Center for Nuclear Security - NCNS

    ScienceCinema

    None

    2016-07-12

    As the United States embarks on a new era of nuclear arms control, the tools for treaty verification must be accurate and reliable, and must work at stand-off distances. The National Center for Nuclear Security, or NCNS, at the Nevada National Security Site, is poised to become the proving ground for these technologies. The center is a unique test bed for non-proliferation and arms control treaty verification technologies. The NNSS is an ideal location for these kinds of activities because of its multiple environments; its cadre of experienced nuclear personnel, and the artifacts of atmospheric and underground nuclear weapons explosions. The NCNS will provide future treaty negotiators with solid data on verification and inspection regimes and a realistic environment in which future treaty verification specialists can be trained. Work on warhead monitoring at the NCNS will also support future arms reduction treaties.

  10. Creation of security engineering programs by the Southwest Surety Institute

    NASA Astrophysics Data System (ADS)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  11. Selecting RMF Controls for National Security Systems

    SciTech Connect

    Witzke, Edward L.

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  12. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ...The National Maritime Security Advisory Committee (NMSAC) will meet on January 18-19, 2012 in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the...

  13. Developing a computer security training program

    SciTech Connect

    Not Available

    1990-01-01

    We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).

  14. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1976-04-19

    AD-At𔃻A 424 FEDERAL AVIATION ADMINISTRATION WASHINGToN DC OFFICE 7 ETC F/6 1/2 EFFECTIVENESS OF THE CIVIL AVIATION SECURITY PROGRAM. U) APR 76...April 19, 1976 Semiannual Report to Congress -on the Effectiveness 6. Pefom,-g o,qn.st.,n Cad of the Civil Aviation Security Program __._. P..I.,mng O,oon...Aviatio’n Administration Office of Civil Aviation Security 1i. C0a,,,c , ,No. 0800 Independence Avenue, SW. Washington, D.C. 20591 13. 7ype of Row iaend Pe

  15. Medical Diplomacy: A Tool for Enabling National Security Strategy Objectives

    DTIC Science & Technology

    2012-04-06

    REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of Information Is estimated to...information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ORGANIZATION. 1. REPORT DATE (DD-MM...SUBJECT TERMS Medical Diplomacy, National Security Strategy, Health Service Support ( HSS ), HSS Doctrine, HSS Engagement Programs, Global Health

  16. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Security awareness training programs. 1552.23... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A...

  17. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Security awareness training programs. 1552.23... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A...

  18. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security awareness training programs. 1552.23... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A...

  19. VICARS and MANAGERS: Organizing for National Security

    DTIC Science & Technology

    1988-11-01

    involvement pushes the NSC staff, and especially the NSC adviser, out of the role of neutral policy coordination and into the mainstream of daily decisions...position of either ruhber- stampin ( or challenging what for all he knew had already been approved by the President. 30 Second. there is a natural...the same time, it is highly unstable: the national security adviser will be constantly lured or pushed across the line separating his role from the

  20. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    NSTec Environmental Management

    2012-02-28

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept DOE non-radioactive classified waste, DOE non-radioactive hazardous classified waste, DOE low-level radioactive waste (LLW), DOE mixed low-level waste (MLLW), and U.S. Department of Defense (DOD) classified waste for permanent disposal. Classified waste is the only waste accepted for disposal that may be non-radioactive and will be required to meet the waste acceptance criteria for radioactive waste as specified in this document. The NNSA/NSO and support contractors are available to assist you in understanding or interpreting this document. For assistance, please call the NNSA/NSO Waste Management Project (WMP) at (702) 295-7063, and your call will be directed to the appropriate contact.

  1. Nevada National Security Site Waste Acceptance Criteria

    SciTech Connect

    none,

    2013-06-01

    This document establishes the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO), Nevada National Security Site Waste Acceptance Criteria (NNSSWAC). The NNSSWAC provides the requirements, terms, and conditions under which the Nevada National Security Site (NNSS) will accept the following: • DOE hazardous and non-hazardous non-radioactive classified waste • DOE low-level radioactive waste (LLW) • DOE mixed low-level waste (MLLW) • U.S. Department of Defense (DOD) classified waste The LLW and MLLW listed above may also be classified waste. Classified waste is the only waste accepted for disposal that may be non-radioactive and shall be required to meet the waste acceptance criteria for radioactive waste as specified in this document. Classified waste may be sent to the NNSS as classified matter. Section 3.1.18 provides the requirements that must be met for permanent burial of classified matter. The NNSA/NFO and support contractors are available to assist the generator in understanding or interpreting this document. For assistance, please call the NNSA/NFO Environmental Management Operations (EMO) at (702) 295-7063, and the call will be directed to the appropriate contact.

  2. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing...

  3. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... requirements-national security contracts. 1352.237-72 Section 1352.237-72 Federal Acquisition Regulations... Provisions and Clauses 1352.237-72 Security processing requirements—national security contracts. As prescribed in 48 CFR 1337.110-70(d), use the following clause: Security Processing...

  4. National transuranic program plan

    SciTech Connect

    Not Available

    1994-10-11

    As a result of various program initiatives, the U.S. generated and will continue to generate waste contaminated with radioactive materials. Because of increased awareness of the risks and special requirements to safely manage long-lived alpha-emitting radionuclides, a new category of radioactive waste, transuranic (TRU) waste, was adopted in 1970. Heads of Field Elements can determine that other alpha-contaminated wastes, peculiar to a specific site, must be managed as transuranic waste{close_quotes}. TRU waste is generated and stored at various DOE sites around the country. In December 1993, the National Transuranic Program Office (NTPO) was established as part of the Carlsbad Area Office (CAO) to integrate and coordinate the diverse organizational elements that contribute to the complex-wide management of TRU waste. Numerous sites with small TRU waste inventories are also part of the national TRU waste system. The majority of TRU waste is also contaminated with hazardous materials and is thus considered mixed waste. Mixed waste must be managed in compliance with all federal, state, and local regulations that are applicable to the radioactive and/or hazardous component of the waste. Each generator site is responsible for the management of its respective waste. Sites must plan and implement programs to minimize, characterize, package, treat, store, ship, and dispose of all TRU waste; construct required waste management facilities and equipment; obtain permits; perform site-specific National Environmental Policy Act (NEPA) analyses; conduct environmental studies; perform laboratory analyses; and certify that waste meets appropriate disposal facility criteria. Due to the toxicity and long half-lives of TRU radionuclides, TRU waste must be disposed in a manner that offers greater confinement than shallow land burial.

  5. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  6. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  7. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  8. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  9. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  10. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  11. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  12. 77 FR 9214 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... to Public Law 92-463, notice is hereby given of a forthcoming meeting of the National Security... Defense concerning requirements established by the David L. Boren National Security Education Act,...

  13. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  14. 48 CFR 606.302-6 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false National security. 606.302... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 606.302-6 National security. (b) This subsection applies to all acquisitions involving national security information,...

  15. 14 CFR § 1260.31 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false National security. § 1260.31 Section Â... AGREEMENTS General Provisions § 1260.31 National security. National Security October 2000 Normally, NASA... performing on the grant who will have access to the information must obtain the appropriate...

  16. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  17. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  18. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 3 The President 1 2012-01-01 2012-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  19. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  20. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  1. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  2. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  3. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  4. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  5. 40 CFR 80.1655 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false National security exemption. 80.1655... (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Gasoline Sulfur § 80.1655 National security exemption. (a...) Tactical military vehicles, engines, or equipment having an EPA national security exemption from...

  6. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  7. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  8. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  9. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 39 Postal Service 1 2014-07-01 2014-07-01 false National Security Information. 267.5 Section 267.5... § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive Order 12356 National Security Information (hereinafter referred to as...

  10. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  11. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  12. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  13. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 20 2011-07-01 2011-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  14. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  15. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 94.908... § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is... regulations in this subpart for reasons of national security. No request for this exemption is necessary....

  16. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  17. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 3 The President 1 2014-01-01 2014-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  18. 48 CFR 6.302-6 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false National security. 6.302-6... COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.302-6 National security. (a) Authority. (1... for when the disclosure of the agency's needs would compromise the national security unless the...

  19. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  20. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  1. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  2. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  3. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  4. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 21 2012-07-01 2012-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must...

  5. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 3 The President 1 2013-01-01 2013-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  6. 5 CFR 9901.314 - National security compensation comparability.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false National security compensation... DEFENSE NATIONAL SECURITY PERSONNEL SYSTEM (NSPS) Pay and Pay Administration Overview of Pay System § 9901.314 National security compensation comparability. (a) To the maximum extent practicable, for...

  7. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  8. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 3 The President 1 2011-01-01 2011-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  9. 40 CFR 91.1008 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 21 2013-07-01 2013-07-01 false National security exemption. 91.1008... Engines § 91.1008 National security exemption. (a)(1) Any marine SI engine, otherwise subject to this part... for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  10. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 20 2014-07-01 2013-07-01 true National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers...

  11. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request...

  12. 28 CFR 501.2 - National security cases.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is...

  13. 3 CFR 101.4 - National Security Council.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false National Security Council. 101.4 Section 101.4... PROCEDURES ACT § 101.4 National Security Council. Freedom of Information regulations for the National Security Council appear at 32 CFR Ch. XXI....

  14. 76 FR 50719 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... 92-463, notice is hereby given of a forthcoming meeting of the National Security Education Board. The... requirements established by the David L. Boren National Security Education Act, Title VII of Public Law...

  15. 77 FR 49439 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-16

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose ] of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102-183, as...

  16. 77 FR 27739 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  17. 76 FR 28960 - National Security Education Board Members Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-19

    ... of the Secretary National Security Education Board Members Meeting AGENCY: Under Secretary of Defense... hereby given of a forthcoming meeting of the National Security Education Board. The purpose of the... established by the David L. Boren National Security Education Act, Title VII of Public Law 102- 183,...

  18. Cyber Security Testing and Training Programs for Industrial Control Systems

    SciTech Connect

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  19. Employment of individuals in the Social Security disability programs.

    PubMed

    O'Leary, Paul; Livermore, Gina A; Stapleton, David C

    2011-01-01

    The articles in this special issue present findings from research on the employment and work-related activities of individuals receiving benefits through the Social Security Disability Insurance and Supplemental Security Income programs, and on the factors that hinder their efforts to work at levels that lead to exiting the disability rolls. This article introduces the other articles, highlights their important findings, and discusses the implications for ongoing efforts to increase the earnings and self-sufficiency of these beneficiaries, such as the Ticket to Work program and the Benefit Offset National Demonstration.

  20. [Evaluation of public policies to promote food security and the fight against hunger, 1995-2002. 3--the Brazilian National Program to Control Vitamin A Deficiency].

    PubMed

    Martins, Maisa Cruz; Santos, Leonor Maria Pacheco; Santos, Sandra Maria Chaves dos; Araújo, Maria da Purificação Nazaré; Lima, Aline Maria Peixoto; Santana, Luciana Alaíde Alves

    2007-09-01

    Vitamin A supplements have been distributed during National Immunization Days since 1983, and Brazil has been a pioneer in this kind of strategy. The current study evaluated the National Program from 1995 to 2002, from a structure-process-results perspective. The methodology involved document research, interviews with health services managers, and a case study in 44 municipalities in Bahia State, resulting in 1,344 household interviews. In relation to structure, from 1998 on the program operated without a normative instrument due to the extinction of the National Institute of Nutrition. Improvements in the processes of vitamin supply procurement and distribution had a positive impact on coverage, reaching 3.5 million capsules in 2002 (72% coverage). For the 2,546 children studied in Bahia, vitamin A distribution was irregular, with annual coverage varying from 8% to 26%. Program managers reported time constraints and insufficient human resources, consistent with the hypothesis that this type of strategy does not help inform the population about the importance of vitamin A. These findings point to the need for systematic linkage between different levels of government in order to fully implement and monitor the program.

  1. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  2. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  3. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  4. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  5. 17 CFR 249.635 - Form X-17A-19, report by national securities exchanges and registered national securities...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Form X-17A-19, report by national securities exchanges and registered national securities associations of changes in the membership... Certain Exchange Members, Brokers, and Dealers § 249.635 Form X-17A-19, report by national...

  6. Contributions to Human Errors and Breaches in National Security Applications.

    SciTech Connect

    Pond, D. J.; Houghton, F. K.; Gilmore, W. E.

    2002-01-01

    Los Alamos National Laboratory has recognized that security infractions are often the consequence of various types of human errors (e.g., mistakes, lapses, slips) and/or breaches (i.e., deliberate deviations from policies or required procedures with no intention to bring about an adverse security consequence) and therefore has established an error reduction program based in part on the techniques used to mitigate hazard and accident potentials. One cornerstone of this program, definition of the situational and personal factors that increase the likelihood of employee errors and breaches, is detailed here. This information can be used retrospectively (as in accident investigations) to support and guide inquiries into security incidents or prospectively (as in hazard assessments) to guide efforts to reduce the likelihood of error/incident occurrence. Both approaches provide the foundation for targeted interventions to reduce the influence of these factors and for the formation of subsequent 'lessons learned.' Overall security is enhanced not only by reducing the inadvertent releases of classified information but also by reducing the security and safeguards resources devoted to them, thereby allowing these resources to be concentrated on acts of malevolence.

  7. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  8. 75 FR 9608 - National Protection and Programs Directorate; Technical Assistance Request and Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... SECURITY National Protection and Programs Directorate; Technical Assistance Request and Evaluation AGENCY: National Protection and Programs Directorate, DHS. ACTION: 60-Day notice and request for comments; new... and Program Directorate. Title: Technical Assistance Request and Evaluation. Form: Not Applicable....

  9. 75 FR 9607 - National Protection and Programs Directorate; Guidance Document Request and Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... SECURITY National Protection and Programs Directorate; Guidance Document Request and Evaluation AGENCY: National Protection and Programs Directorate, DHS. ACTION: 60-Day notice and request for comments; new... and Programs Directorate. Title: Guidance Document Request and Evaluation. Form: Not Applicable....

  10. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  11. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    SciTech Connect

    2006-12-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  12. Leveraging Safety Programs to Improve and Support Security Programs

    SciTech Connect

    Leach, Janice; Snell, Mark K.; Pratt, R.; Sandoval, S.

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  13. 15 CFR 930.122 - Necessary in the interest of national security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... COASTAL RESOURCE MANAGEMENT FEDERAL CONSISTENCY WITH APPROVED COASTAL MANAGEMENT PROGRAMS Appeal to the Secretary for Review Related to the Objectives of the Act and National Security Interests § 930.122... objectives....

  14. Estonian National Security Strategy: Current and Future Challenges

    DTIC Science & Technology

    2013-03-01

    2013 2 . REPORT TYPE STRATEGY RESEARCH PROJECT .33 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Estonian National Security Strategy...the existing Estonian Security Strategy and offers recommendations. 2 1. Estonian Security Environment: International Relations...Copenhagen School is understood in wider terms than the political-military and state-centered view of traditional security studies. 2 According to Buzan

  15. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for...

  16. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  17. 78 FR 19277 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-29

    ... SECURITY Coast Guard National Maritime Security Advisory Committee; Meeting AGENCY: United States Coast... published a notice of meeting for the National Maritime Security Advisory Committee (NMSAC) in the Federal... reported. NMSAC will now meet on April 2, 2013 via web and teleconference to discuss various...

  18. Developing and Implementing an Effective National Security Strategy for Croatia

    DTIC Science & Technology

    2013-03-01

    documents. The final analysis identifies problems in the insufficient national security system and the lack of political want to efficiently deal with...national security system and the lack of political want to efficiently deal with national security issues. The essay ends with several...Croatia and abroad, and all the political parties used every available means including their lives to achieve all national goals which is obvious from

  19. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  20. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  1. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  2. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  3. 17 CFR 240.19g2-1 - Enforcement of compliance by national securities exchanges and registered securities associations...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... national securities exchanges and registered securities associations with the Act and rules and regulations... Enforcement of compliance by national securities exchanges and registered securities associations with the Act... associated with its members, a national securities exchange or registered securities association is...

  4. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Access to restricted data and national security... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security...

  5. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Access to restricted data and national security... Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access to restricted data and national security...

  6. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  7. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  8. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  9. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  10. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  11. 75 FR 45154 - National Security Division; Agency Information Collection Activities:

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division; Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... information, please write to U.S. Department of Justice, 10th & Constitution Avenue, NW., National...

  12. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  13. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  14. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 4 2012-07-01 2012-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  15. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false National security-classified... Restrictions § 1256.46 National security-classified information. In accordance with 5 U.S.C. 552(b)(1), NARA... properly classified under the provisions of the pertinent Executive Order on Classified National...

  16. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  17. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 4 2014-07-01 2014-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  18. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  19. 29 CFR 1606.3 - The national security exception.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false The national security exception. 1606.3 Section 1606.3... DISCRIMINATION BECAUSE OF NATIONAL ORIGIN § 1606.3 The national security exception. It is not an unlawful employment practice to deny employment opportunities to any individual who does not fulfill the...

  20. 10 CFR 871.1 - National security exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false National security exemption. 871.1 Section 871.1 Energy DEPARTMENT OF ENERGY AIR TRANSPORTATION OF PLUTONIUM § 871.1 National security exemption. (a) The following DOE air shipments of plutonium are considered as being made for the purposes of national...

  1. The National Sea Grant Program.

    ERIC Educational Resources Information Center

    Spector, Barbara S.

    1980-01-01

    Described is the National Sea Grant College Program which supports education and training, research, and advisory extension services through the National Office of Sea Grant and the Sea Grant Network of 30 programs in coastal and Great Lake states. Water-related topics include water's relationship to nature, society, and human expression.…

  2. Neuroscience, Ethics, and National Security: The State of the Art

    PubMed Central

    Tennison, Michael N.; Moreno, Jonathan D.

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146

  3. Status of Educational Efforts in National Security Workforce

    SciTech Connect

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  4. Neuroscience, ethics, and national security: the state of the art.

    PubMed

    Tennison, Michael N; Moreno, Jonathan D

    2012-01-01

    National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.

  5. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Airport tenant security programs. 1542.113 Section 1542.113 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  6. 49 CFR 1542.113 - Airport tenant security programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Airport tenant security programs. 1542.113 Section 1542.113 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY...

  7. DoD Industrial Security Program

    DTIC Science & Technology

    1985-12-01

    24 1-237 Imigrant Alien . . . . . . . . . . . . . . . . . . . . . . 24 1-238 Industrial Security .. .. ..r. ....... .... 24 1-239...Included in this definition is any natural person who is not a citizen or national of the U.S. (An Imigrant alien as defined in paragraph 1-237 is...Any person lawfully admitted into the U.S. under an imigration visa foýr permanent residence is an immigrant alien (see paragraph 2-308 for special

  8. National Science Foundation Programs.

    ERIC Educational Resources Information Center

    Curtis, Kent K.

    Established by Congressional Act in 1950, the National Science Foundation (NSF) is charged with a variety of responsibilities in the areas of education, research, applications of research, data gathering, and information dissemination. The foundation is governed by an appointed director and a national board and is primarily funded by the federal…

  9. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1982-10-26

    12 IX. CIVIL AVIATION SECURITY ACTIONS . . . . . . 14 X . MPIANCE M EN4FOW . ........ 20 X . U . . . . . ... . . . . .. . . . 21 EXHIBITS 1...Screening Results 10. Weapon Detection Devices 11. X -Ray Baggage Inspection Systems 12. Basic Policies 13. Regulatory Impact 14. FAA Sponsored Explosive...WERE APPROVED FOR MORE THAN 200 AIRPORTS. D . TESTING WAS BEGUN ON A NEW C MPUTER PROGRAM FOR HE X -RAY ABSORPTION SYSTEM DEVELOPED TO DTECT BMBS IN

  10. 10 CFR 605.18 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS THE OFFICE OF ENERGY RESEARCH FINANCIAL ASSISTANCE... the Office of Safeguards and Security for Headquarters awards, or from the cognizant field office Division of Safeguards and Security for awards obtained through DOE field organizations. Costs...

  11. 75 FR 18872 - Ginnie Mae Multiclass Securities Program Documents

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-13

    ... URBAN DEVELOPMENT Ginnie Mae Multiclass Securities Program Documents AGENCY: Office of the Chief... collection of information is required in connection with the Multiclass Securities Program. The intent of the Multiclass Securities program is to increase liquidity in the secondary mortgage market and to attract...

  12. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 3 2014-01-01 2014-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures...

  13. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures...

  14. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures...

  15. National Geospatial Program

    USGS Publications Warehouse

    Carswell, William J.

    2011-01-01

    increases the efficiency of the Nation's geospatial community by improving communications about geospatial data, products, services, projects, needs, standards, and best practices. The NGP comprises seven major components (described below), that are managed as a unified set. For example, The National Map establishes data standards and identifies geographic areas where specific types of geospatial data need to be incorporated into The National Map. Partnership Network Liaisons work with Federal, State, local, and tribal partners to help acquire the data. Geospatial technical operations ensure the quality control, integration, and availability to the public of the data acquired. The Emergency Operations Office provides the requirements to The National Map and, during emergencies and natural disasters, provides rapid dissemination of information and data targeted to the needs of emergency responders. The National Atlas uses data from The National Map and other sources to make small-scale maps and multimedia articles about the maps.

  16. 40 CFR 94.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) CONTROL OF EMISSIONS FROM MARINE COMPRESSION-IGNITION ENGINES Exclusion and Exemption Provisions § 94.908 National security exemption. (a)(1) Any marine engine, otherwise subject to this part, that is...) Manufacturers may request a national security exemption for any marine engine, otherwise subject to this...

  17. The Role of Information Technology in National Security Policy

    DTIC Science & Technology

    1994-01-01

    processes that add to the economic and military dimensions of national security. The model uses a " systems thinking " approach. It attempts to integrate...perspective on national security into a multidisciplinary and coherent body of theory and practice from a holistic " systems thinking " view.

  18. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  19. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false National Security Information. 267.5 Section 267.5 Postal Service UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.5 National Security Information. (a) Purpose and scope. The purpose of this section is to provide regulations implementing Executive...

  20. 40 CFR 204.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 204.5-2 Section 204.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT... national security exemption shall be void ab initio with respect to each new product, originally...

  1. 39 CFR 267.5 - National Security Information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Executive Order) which deals with the protection, handling and classification of national security.... (2) Derivative Classification means the carrying forward of a classification from one document to a... derivative classification of national security information in the custody of, and use by, the Postal...

  2. Project on National Security Reform: Forging a New Shield

    DTIC Science & Technology

    2008-11-01

    their strength. While humans have a natural tendency to communicate and trade, the integration of world economies has resulted from specific...sharing, and strategy confusion for the national security system throughout the world . 634 Cause: The nature of national security events is growing...Mart, the Walt Disney Corporation, or Microsoft. 1457 These four American corporations do not have the same organizational

  3. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    .... Maritime Labor. International and Inter-modal Supply Chain. Maritime Hazardous Materials Handling/Shipping... National Maritime Security Advisory Committee (NMSAC). This Committee advises and makes recommendations on... makes recommendations to the Secretary on matters relating to national maritime security. Such...

  4. AVIATION SECURITY: Terrorist Acts Demonstrate Urgent Need to Improve Security at the Nation’s Airports

    DTIC Science & Technology

    2007-11-02

    what actually occurred or what all the weaknesses in the nation’s aviation security apparatus are that contributed to the horrendous events of last week...it is clear that serious weaknesses exist in our aviation security system and that their impact can be far more devastating than previously imagined...offer some observations about improving aviation security in these various areas.

  5. LANL Safeguards and Security Assurance Program. Revision 6

    SciTech Connect

    1995-04-03

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.

  6. SDI (Strategic Defense Initiative) and national security policy. Research report

    SciTech Connect

    Davis, R.W.

    1988-04-01

    The paper attempts to answer the fundamental question of Can SDI make a significant contribution to US national security. It uses as its evaluation criteria historical arms-control measurements of stability, reduction in the probability of war, reduction in the consequences of war, economic benefits, and political benefits. A historical discussion of US nuclear strategy development along with Soviet thinking is provided as a backdrop to set the stage for an analysis of the reasons for President Reagan's March 1983 speech. The objectives of SDI are discussed along with the major concerns expressed by the program critics. Using the evaluation criteria defined above, the author analyzes SDI potential position in a long-term integrated national strategy that includes arms control and competitive strategies.

  7. Employment among Social Security disability program beneficiaries, 1996-2007.

    PubMed

    Mamun, Arif; O'Leary, Paul; Wittenburg, David C; Gregory, Jesse

    2011-01-01

    We use linked administrative data from program and earnings records to summarize the 2007 employment rates of Social Security disability program beneficiaries at the national and state levels, as well as changes in employment since 1996. The findings provide new information on the employment activities of beneficiaries that should be useful in assessing current agency policies and providing benchmarks for ongoing demonstration projects and future return-to-work initiatives. The overall employment rate--which we define as annual earnings over $1,000--was 12 percent in 2007. Substantial variation exists within the population. Disability Insurance beneficiaries and those younger than age 40 were much more likely to work relative to other Social Security beneficiaries. Additionally, substantial regional variation exists across states; employment rates ranged from 7 percent (West Virginia) to 23 percent (North Dakota). Moreover, we find that the employment rates among beneficiaries were sensitive to the business cycle and persistent over time.

  8. EPA'S NATIONAL COASTAL ASSESSMENT PROGRAM

    EPA Science Inventory

    The National Coastal Assessment (NCA) is an environmental monitoring program initiated by the US Environmental Protection Agency's Office of Research and Development in 2000. The goal is to monitor selected ecological indicators in the nation's estuarine waters and to produce an...

  9. Wage and salary stabilization in a national security emergency

    SciTech Connect

    Not Available

    1984-10-01

    This guidance document provides the necessary information to State and local government leaders on their roles in their jurisdictions related to wage and salary stabilization (WSS)* during a national security emergency. The guidance covers the areas of policy, authority, and concept of operations for the emergency conditions of evacuation during an intense crisis prior to attack and post-attack recovery following a nuclear attack. The document provides the basis for improving the readiness of State and local jurisdictions for undertaking economic stabilization programs. Under the conditions of severe economic dislocation attendant to a national emergency that results in an attack on our nation, the primary objective of economic stabilization would be to maintain and protect the surviving economy as part of the overall effort directed toward national survival and recovery. Stabilization strategies would be applied to: financial and monetary systems; wages, salaries, and benefits; prices; rents; and rationing of essential goods. These measures are designed to maintain public confidence in the market and financial systems and their institutions so that general inflation can be controlled, scarce resources conserved, and the recovery effort supported so that the most efficient use is made of human material and capital resources to bring about national recovery as rapidly as possible.

  10. Strategic Planning for National Security: A New Project Solarium

    DTIC Science & Technology

    2006-01-01

    effective strategic planning process for national security. Fifteen years after the Cold War, the United States still lacks a comprehensive interagency...articulate a set of national goals and objectives, it was not the product of serious strategic planning . More than 4 years after September 11, 2001...how the country will achieve its stated goals. Various institutions in the national security apparatus have attempted strategic planning , but these

  11. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  12. A deeper look at climate change and national security.

    SciTech Connect

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  13. 33 CFR 106.135 - Alternative Security Program.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.135...

  14. 33 CFR 106.135 - Alternative Security Program.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.135...

  15. 33 CFR 106.135 - Alternative Security Program.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Alternative Security Program. 106.135 Section 106.135 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.135...

  16. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  17. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  18. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  19. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  20. 6 CFR 27.235 - Alternative security program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... facilities may submit an Alternate Security Program (ASP) pursuant to the requirements of this section. The... submit an ASP in lieu of a Security Vulnerability Assessment, Site Security Plan, or both. (2) Tier 1, Tier 2, or Tier 3 facilities may submit an ASP in lieu of a Site Security Plan. Tier 1, Tier 2,...

  1. 75 FR 4894 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and... 31, 2009, National Securities Clearing Corporation (``NSCC'') filed with the Securities and...

  2. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 7 2012-01-01 2012-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of...

  3. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 7 2013-01-01 2013-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of...

  4. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 7 2014-01-01 2014-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of...

  5. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of...

  6. 7 CFR 772.7 - Leasing minor program loan security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of...

  7. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    SciTech Connect

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  8. A Tale of Three Cities. Security Education Employment Program.

    ERIC Educational Resources Information Center

    National Crime Prevention Council, Washington, DC.

    This report discusses the Security Education Employment Program (SEEP), an employment and training program for high school students that matches students with opportunities in private security. It outlines the seven objectives established for the three-city test--job placements, exposure to the security profession, enhanced job skills, development…

  9. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Security awareness training programs. 1552.23... School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight... awareness training in accordance with this subpart; and (2) If an instructor is conducting the...

  10. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Security awareness training programs. 1552.23... School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight... awareness training in accordance with this subpart; and (2) If an instructor is conducting the...

  11. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  12. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Access to restricted data and national security... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a)...

  13. Climate Change: Implications for National Security and Strategy

    DTIC Science & Technology

    2011-11-02

    The  National  Security  Implications  of   Climate   Change       November  2,  2011   Climate Change : Implications for National Security and...00-00-2011 4. TITLE AND SUBTITLE Climate Change : Implications for National Security and Strategy 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c... Change       November  2,  2011   Climate Change : Part of the Strategic Landscape Enduring  trends  and  operational  challenges  will  shape

  14. Proceedings of the Seminar on the DoD Computer Security Initiative Program (2nd), National Bureau of Standards, Gaithersburg, Maryland, January 15-17, 1980.

    DTIC Science & Technology

    1980-01-01

    development or being marketed by the manufacturers do not represent anything close to the qtate-of-the-art in system development and therefore a major...and cost of today’s generalized systems and their widespread availability in the commercial market militates against the development by the Intelligence...demonstrably more secure, the Intelligence Community will provide a ready market for such products. 7. We recognize that as significant a portion of the

  15. Environmental Programs at Los Alamos National Laboratory

    SciTech Connect

    Jones, Patricia

    2012-07-11

    Summary of this project is: (1) Teamwork, partnering to meet goals - (a) Building on cleanup successes, (b) Solving legacy waste problems, (c) Protecting the area's environment; (2) Strong performance over the past three years - (a) Credibility from four successful Recovery Act Projects, (b) Met all Consent Order milestones, (c) Successful ramp-up of TRU program; (3) Partnership between the National Nuclear Security Administration's Los Alamos Site Office, DOE Carlsbad Field Office, New Mexico Environment Department, and contractor staff enables unprecedented cleanup progress; (4) Continued focus on protecting water resources; and (5) All consent order commitments delivered on time or ahead of schedule.

  16. 75 FR 45152 - National Security Division: Agency Information Collection Activities: Proposed Collection...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-02

    ... National Security Division: Agency Information Collection Activities: Proposed Collection; Comments... (Foreign Agents). The Department of Justice (DOJ), National Security Division (NSD), will be submitting the... & Constitution Avenue, NW., National Security Division, Counterespionage Section/ Registration Unit,...

  17. Geo-Strategic Context: South Asia, A National Security Strategy

    DTIC Science & Technology

    1998-02-27

    ARCHIVE COPY NATIONAL DEFENSE UNIVERSITY NATIONAL WAR COLLEGE GEO-STRATEGIC CONTEXT SOUTH ASIA, A NATIONAL SECURITY STRATEGY MS Youngeun ... Anderson and Captain D Craig Wellmg/Class of 1998 Course 5604 Seminar I FACULTY SEMINAR LEADER CAPT J Kelso 27 February 1998 78-E-54 c-. I Report

  18. Expansion of National Security Agency Oversight Act

    THOMAS, 113th Congress

    Rep. Carney, John C., Jr. [D-DE-At Large

    2014-01-15

    03/20/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    ERIC Educational Resources Information Center

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that…

  20. 75 FR 37253 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... 2001.60 General. Subpart G--Security Education and Training 2001.70 General. 2001.71 Coverage. Subpart........... 5.4 2001.70 Security Education and Training, 5.4 General. 2001.71 Coverage 1.3(d), 2.1(d), 3.7(b), 4... the subject of a challenge or access demand pursuant to the Order or law. Sec. 2001.11...

  1. Proceedings of the Seminar on the DoD Computer Security Initiative Program, National Bureau of Standards, Gaithersburg, Maryland, July 17-18, 1979.

    DTIC Science & Technology

    1979-01-01

    ucinlPoetReur-M dUet : ora TRADITIONAL SOFWR SYTE EVLPMN eae Top-Leve c -- * PROTECTION IN A KERNEL-BASED SYSTEM I SER RESTOF0 EAT NGS SSTEh KERNEL:11 :1 HARD...DESIGNPROO PRES OLS 0 SSKre einpoe ob multileve secure. - 18S3ene sg proven trmpovber - 15 K~LO CPU-minutes required FW.4 £.e* q *s4 aI G-7 KSOS IMPLEMENTATION...integrity compartment set (now always null) - Discretionary access information Q =") Ford AeOespoe. & Comm"kcstleft Ca oP4i11 G -1 KSOS Kernel Process

  2. A Delicate Balance: National Security vs. Public Access

    DTIC Science & Technology

    2005-03-01

    AVAILABILITY STATEMENT Approved for Public Release; Distribution Unlimited 13. SUPPLEMENTARY NOTES: Published in Computers in Libraries , Vol.25 No. 3...security; in January 2004, is a how-to guide on gathering useful <, MARCH 2005 17 I COMPUTERS IN LIBRARIES feature: national security vs. public access

  3. A National Partnership for Careers in Public Safety and Security

    ERIC Educational Resources Information Center

    Coffee, Joseph

    2007-01-01

    A partnership of state, local and federal public safety agencies, secondary and postsecondary educational institutions, and professional and educational associations, the National Partnership for Careers in Law, Public Safety, Corrections and Security also serves as the lead organization for the Law, Public Safety, Corrections and Security Career…

  4. Strong Artificial Intelligence and National Security: Operational and Strategic Implications

    DTIC Science & Technology

    2015-05-18

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Strong Artificial Intelligence and National Security 5a...Prominent business and science leaders believe that technological advances will soon allow humankind to develop artificial intelligence (AI) that...its potential strategic pitfalls. 15. SUBJECT TERMS Artificial Intelligence 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT

  5. 40 CFR 211.110-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 211.110-2 Section 211.110-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE... security exemption shall be void ab initio with respect to each new product, originally intended for...

  6. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  7. Russian National Security Policy: Perceptions, Policies, and Prospects

    DTIC Science & Technology

    2001-07-01

    that policy in terms of factors influencing Russian national security policy formulation, Russia’s perceptions of the world and itself, current Russian...security and foreign policies in key regions of the world , and prospects for Russian interests and actions in the world and especially with regard to the United States.

  8. Analytical Chemistry for Homeland Defense and National Security

    SciTech Connect

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  9. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  10. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  11. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  12. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  13. 48 CFR 204.470-2 - National security exclusion.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Within Industry 204.470-2 National security exclusion. (a) The U.S.-IAEA AP permits the United States... contractor is required to report any of its activities in accordance with the U.S.-IAEA AP, the...

  14. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  15. U.S. National Security and Strategy: A Selected Bibliography

    DTIC Science & Technology

    2007-10-01

    National Security and the Threat of Climate Change . Alexandria: CNA Corpora- tion, 2007. 68pp. (UA23. N171 2007) http://securityandclimate.cna.org/report...2005) Schwartz, Peter, and Doug Randall. An Abrupt Climate Change Scenario and Its Implications for United States National Security. New York: Time...CSIS Press, 2004. 73pp. (DS79.76 .C567 2004) Cordesman, Anthony H., and Ionut C. Popescu. The Changing Challenges of U.S. Defense Spend- ing

  16. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Chestnut Ridge Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    SciTech Connect

    2001-09-01

    This report presents an evaluation of the groundwater and surface water monitoring data obtained during calendar year (CY) 2000 from sampling locations in the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Chestnut Ridge Regime encompasses several hazardous and nonhazardous waste management facilities associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) southeast of Oak Ridge, Tennessee (Figure A.1). Prepared by the Y-12 Groundwater Protection Program (GWPP), this monitoring data evaluation report addresses applicable provisions of DOE Order 5400.1 -- General Environmental Protection Program -- that require: (1) an evaluation of the quantity and quality of groundwater in areas that are, or could be, impacted by Y-12 operations, (2) an evaluation of the quality of surface water and groundwater where contaminants from Y-12 facilities are most likely to migrate beyond the DOE Oak Ridge Reservation (ORR) property line, and (3) an evaluation of long-term trends in groundwater quality at Y-12. The following sections of this report contain relevant background information (Section 2.0); describe the results of the respective data evaluations required under DOE Order 5400.1 (Section 3.0); summarize significant findings of each evaluation (Section 4.0); and list the technical reports and regulatory documents cited for more detailed information (Section 5.0). Illustrations (maps and trend graphs) and data summary tables referenced in each section are presented in Appendix A and Appendix B, respectively.

  17. The importance of establishing a national health security preparedness index.

    PubMed

    Lumpkin, John R; Miller, Yoon K; Inglesby, Tom; Links, Jonathan M; Schwartz, Angela T; Slemp, Catherine C; Burhans, Robert L; Blumenstock, James; Khan, Ali S

    2013-03-01

    Natural disasters, infectious disease epidemics, terrorism, and major events like the nuclear incident at Fukushima all pose major potential challenges to public health and security. Events such as the anthrax letters of 2001, Hurricanes Katrina, Irene, and Sandy, severe acute respiratory syndrome (SARS) and West Nile virus outbreaks, and the 2009 H1N1 influenza pandemic have demonstrated that public health, emergency management, and national security efforts are interconnected. These and other events have increased the national resolve and the resources committed to improving the national health security infrastructure. However, as fiscal pressures force federal, state, and local governments to examine spending, there is a growing need to demonstrate both what the investment in public health preparedness has bought and where gaps remain in our nation's health security. To address these needs, the Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (PHPR), is creating an annual measure of health security and preparedness at the national and state levels: the National Health Security Preparedness Index (NHSPI).

  18. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?

    PubMed

    Desai, Sonalde; Vanneman, Reeve

    2015-08-05

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes - on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA.

  19. 48 CFR 1352.237-72 - Security processing requirements-national security contracts.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... System DEPARTMENT OF COMMERCE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Security processing... favorable results. No national security material or documents shall be removed from a Department of...

  20. Swords into plowshares: Military geology and national security projects

    SciTech Connect

    Neal, J.T.

    1994-12-31

    Military geology and national security projects are often comparable, achieving their rai-son d`etre in support of national goals, military operations, and/or systems-all for vital national interests. The application of Geoscience to these ends, especially engineering geology, has occurred from pole to pole and included every conceivable environment and natural condition. In the conduct of such projects, the Geosciences have advanced, and vice versa. Desert trafficability, most notably regarding playa surfaces, is both temporary and variable and not a persistent condition as some early authors believed. Playas in Australia, Iran, and the US show that saline efflorescence is removed following surface water dissolution and subsequent deflation, resulting in very hard crusts. Magadiite, a hydrous sodium silicate and possible precursor of bedded chert, was first discovered in North America at Alkali Lake, OR, during a military project. Pleistocene Lake Trinity, a small and mostly buried evaporate basin in the northern Jornada del Muerto, NM, was discovered during exploratory drilling in support of a military test program.

  1. National Dairy Genetic Evaluation Program

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The National Dairy Genetic Evaluation Program is a continuation of ongoing USDA collaboration with the U.S. dairy industry on genetic evaluation of dairy cattle since 1908. Data are provided by dairy records processing centers (yield, health, pedigree, and reproduction traits), breed registry societ...

  2. Disposal Activities and the Unique Waste Streams at the Nevada National Security Site (NNSS)

    SciTech Connect

    Arnold, P.

    2012-10-31

    This slide show documents waste disposal at the Nevada National Security Site. Topics covered include: radionuclide requirements for waste disposal; approved performance assessment (PA) for depleted uranium disposal; requirements; program approval; the Waste Acceptance Review Panel (WARP); description of the Radioactive Waste Acceptance Program (RWAP); facility evaluation; recent program accomplishments, nuclear facility safety changes; higher-activity waste stream disposal; and, large volume bulk waste streams.

  3. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-11-09

    which have been prevented or deterred by airline and airport security procedures cannot be determined with certainty. The Federal Aviation Administration...finalized and issued. The new FAR Part 108, Air Carrier Security and complementary changes to FAR Part 107, Airport Security , and FAR Part 129, Operations...initiated audit of the claims and, if verified, action will be taken to seek funding for payment. Airport Security . Airport security measures continue to be

  4. 76 FR 43319 - Record of Decision for the Continued Operation of the Y-12 National Security Complex

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-20

    ... for use in naval and research reactors, and dispositions surplus materials. Y-12 nuclear nonproliferation programs play a critical role in securing our nation and the world and combating the spread...

  5. Classified Component Disposal at the Nevada National Security Site

    SciTech Connect

    Poling, J.; Arnold, P.; Saad, M.; DiSanza, F.; Cabble, K.

    2012-11-05

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012.

  6. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect

    2009-10-01

    defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to

  7. The Impact of National Debt on U.S. National Security

    DTIC Science & Technology

    2011-05-29

    Pr og ra m R es ea rc h Pr oj ec t THE IMPACT OF NATIONAL DEBT ON U.S. NATIONAL SECURITY BY COLONEL MARTIN L. BLANK United States Army...DISTRIBUTION STATEMENT A: Approved for Public Release. Distribution is Unlimited. This PRP is submitted in partial fulfillment of the...DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Impact of National Debt on U.S. National Security 5a. CONTRACT NUMBER 5b. GRANT

  8. Los Alamos National Laboratory Waste Management Program

    SciTech Connect

    Lopez-Escobedo, G.M.; Hargis, K.M.; Douglass, C.R.

    2007-07-01

    Los Alamos National Laboratory's (LANL) waste management program is responsible for disposition of waste generated by many of the LANL programs and operations. LANL generates liquid and solid waste that can include radioactive, hazardous, and other constituents. Where practical, LANL hazardous and mixed wastes are disposed through commercial vendors; low-level radioactive waste (LLW) and radioactive asbestos-contaminated waste are disposed on site at LANL's Area G disposal cells, transuranic (TRU) waste is disposed at the Waste Isolation Pilot Plant (WIPP), and high-activity mixed wastes are disposed at the Nevada Test Site (NTS) after treatment by commercial vendors. An on-site radioactive liquid waste treatment facility (RLWTF) removes the radioactive constituents from liquid wastes and treated water is released through an NPDES permitted outfall. LANL has a very successful waste minimization program. Routine hazardous waste generation has been reduced over 90% since 1993. LANL has a DOE Order 450.1-compliant environmental management system (EMS) that is ISO 14001 certified; waste minimization is integral to setting annual EMS improvement objectives. Looking forward, under the new LANL management and operating contractor, Los Alamos National Security (LANS) LLC, a Zero Liquid Discharge initiative is being planned that should eliminate flow to the RLWTF NPDES-permitted outfall. The new contractor is also taking action to reduce the number of permitted waste storage areas, to charge generating programs directly for the cost to disposition waste, and to simplify/streamline the waste system. (authors)

  9. Metrics for the National SCADA Test Bed Program

    SciTech Connect

    Craig, Philip A.; Mortensen, J.; Dagle, Jeffery E.

    2008-12-05

    The U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) National SCADA Test Bed (NSTB) Program is providing valuable inputs into the electric industry by performing topical research and development (R&D) to secure next generation and legacy control systems. In addition, the program conducts vulnerability and risk analysis, develops tools, and performs industry liaison, outreach and awareness activities. These activities will enhance the secure and reliable delivery of energy for the United States. This report will describe metrics that could be utilized to provide feedback to help enhance the effectiveness of the NSTB Program.

  10. After Iraq: The Search for a Sustainable National Security Strategy

    DTIC Science & Technology

    2009-01-01

    or cunningly applied economic coercion may remove need for the spilling of blood . However, since national security strategy has the military...great issues between nations at war have always been decided—except in the rarest of cases—either by what your army can do against your enemy’s

  11. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS...

  12. 36 CFR 1256.46 - National security-classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false National security-classified information. 1256.46 Section 1256.46 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE ACCESS TO RECORDS AND DONATED HISTORICAL MATERIALS General Restrictions § 1256.46...

  13. Risk assessment of climate systems for national security.

    SciTech Connect

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  14. Personnel Security Assurance Program: Profile From 1992 through 2000

    SciTech Connect

    Center for Human Reliability Studies

    2001-05-01

    The Personnel Security Assurance Program (PSAP) was initiated to ensure that individuals employed in certain positions in the Department of Energy (DOE) meet and maintain high standards of reliability and trustworthiness. The positions included in the PSAP fall into three groups: (1) positions that provide direct access to, or have direct responsibility for transporting, category I quantities of special nuclear material; (2) positions that afford unescorted access to the control areas of nuclear material production reactors; and (3) positions having the potential for causing unacceptable damage to national security. Although individuals in the PSAP are subject to the customary access authorization criteria, the program establishes a more intensive and frequent review process for maintaining PSAP access authorizations. This report presents information from 1992 through 2000, both overall and stratified by DOE site, on individuals removed from the PSAP. Only a small percentage of removals (generally less than 5% per year) were caused by actions on the part of program participants that brought into question their loyalty, trustworthiness, or reliability. Most removals were due to administrative reasons, such as employees retiring, paperwork delays, or positions being reclassified due to change in scope. In this report the term ''reliability issues'' will be used for causes of removal that are based on derogatory issues delineated in Title 10 Code of Federal Regulations, Part 710 (10 CFR, Part 710), and ''non-reliability issues'' will refer to all other sources for removal of employees from PSAP.

  15. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    SciTech Connect

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon sequestration

  16. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1978-03-31

    regulation that established basic airport security requirements is nearing final rulemaking action. One of the most significant revisions proposed would...prevented or deterred by airline and airport security procedures cannot be determined with certainty. However, the number of firearms detected at passenger...support for airline and airport security measures. And finally, with the inclusion of security costs in the operating expenses of U.S. air

  17. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1985-04-12

    other crimes against civil aviation prevented or deterred by airline and airport security procedures cannot be determined with certainty. However...were prevented from doing so by airline and airport security measures. As noted elsewhere in this report, 1,632 firearms were detected at screening...enforcement sQp:)t’ for airline and airport security measures. Finally, with the inc.asoDr of security costs in airline ticket prices, the passengers

  18. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    SciTech Connect

    Davis, G.; Mansur, D.L.; Ruhter, W.D.; Steele, E.; Strait, R.S.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  19. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1977-10-31

    searches. Perhaps the best evidence of the effectiveness of airline and airport security measures is the number of hijackings and related crimes...revision of the regulation that established basic airport security requirements is currently underway. One of the more significant revisions under study... airport security procedures cannot be determined with certainty. Nowever, the number of firearms detected at passenger screening points under suspicious

  20. 77 FR 41837 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-16

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and... is hereby given that on June 28, 2012, National Securities Clearing Corporation (``NSCC'') filed...

  1. 75 FR 39721 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-12

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and... is hereby given that on June 11, 2010, the National Securities Clearing Corporation (``NSCC'')...

  2. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Motor Vehicle... following: (1) Tactical military motor vehicles or tactical military nonroad engines, vehicles or equipment, including locomotive and marine, having an EPA national security exemption from the motor vehicle...

  3. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Motor Vehicle... following: (1) Tactical military motor vehicles or tactical military nonroad engines, vehicles or equipment, including locomotive and marine, having an EPA national security exemption from the motor vehicle...

  4. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) REGULATION OF FUELS AND FUEL ADDITIVES Motor Vehicle... following: (1) Tactical military motor vehicles or tactical military nonroad engines, vehicles or equipment, including locomotive and marine, having an EPA national security exemption from the motor vehicle...

  5. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 2 2014-10-01 2014-10-01 false HIPAA privacy, security, administrative data standards, and national identifiers. 403.812 Section 403.812 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS SPECIAL PROGRAMS AND PROJECTS...

  6. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1989-05-01

    and airport security measures. Finally, the passengers, the ultimate beneficiaries of the security program, pay for the costs of the program through...required to adopt and use a security program which provides a secure operating environment for these air carriers. Airport security programs are designed to...special security requirements. This additional level of security precaution has been effected through changes to the F4A-approved airport security programs

  7. DSSTOX NATIONAL TOXICOLOGY PROGRAM BIOASSAY ...

    EPA Pesticide Factsheets

    NTPBSI: National Toxicology Program Bioassay On-line Database Structure-Index Locator File. Database contains the results collected on approxiately 300 toxicity studies from shorter duration test and from genetic toxicity studies, both in vitro and in vivo tests. Database contains the results collected on approxiately 300 toxicity studies from shorter duration test and from genetic toxicity studies, both in vitro and in vivo tests.

  8. National Aerospace Plane (NASP) program

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Artists concept of the X-30 aerospace plane flying through Earth's atmosphere on its way to low-Earth orbit. the experimental concept is part of the National Aero-Space Plane Program. The X-30 is planned to demonstrate the technology for airbreathing space launch and hypersonic cruise vehicles. Photograph and caption published in Winds of Change, 75th Anniversary NASA publication (page 117), by James Schultz.

  9. Soviet National Middle Atmosphere Program

    NASA Technical Reports Server (NTRS)

    Danilov, A. D.

    1982-01-01

    Soviet national MAP program comprises seven projects: lower thermosphere (structure and dynamics); high latitude energetic sources and their effect on the structure and dynamics of the upper atmosphere under conditions of the polar night; climate of the stratosphere and mesosphere (effects of various energetic sources on its formation); winter variability in the lower ionosphere; noctilucent clouds (climatology, dynamics, nature, and genesis); wave processes and structure and dynamics of the stratosphere and mesosphere; and dynamics of the ozone layer.

  10. 78 FR 51192 - Secure Supply Chain Pilot Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... HUMAN SERVICES Food and Drug Administration Secure Supply Chain Pilot Program AGENCY: Food and Drug Administration, HHS. ACTION: Notice. SUMMARY: The Food and Drug Administration (FDA or the Agency) is announcing the start of the Secure Supply Chain Pilot Program (SSCPP). The SSCPP is intended to assist FDA in...

  11. An Innovative Community College Program and Partnership in Information Security.

    ERIC Educational Resources Information Center

    Howard, Barbara C; Morneau, Keith A.

    This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…

  12. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy... achieve national health security and to implement the first quadrennial National Health Security Strategy... the National Health Security Strategy of the United States of America (2009) the U.S. Government...

  13. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  14. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  15. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  16. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...

  17. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  18. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  19. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security Division; interpretation of Executive Orders. (a) The Assistant Attorney General for National Security or...

  20. 31 CFR 9.4 - Criteria for determining effects of imports on national security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... imports on national security. 9.4 Section 9.4 Money and Finance: Treasury Office of the Secretary of the Treasury EFFECTS OF IMPORTED ARTICLES ON THE NATIONAL SECURITY § 9.4 Criteria for determining effects of imports on national security. (a) In determining the effect on the national security of imports of...